functions/html_to_text.php in Chat module allows execution of arbitrary PHP cod
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | CVE-2012-6554 | 23 May 201315:55 | – | cve |
![]() | Active Collab "chat module" Remote PHP Code Injection Exploit | 19 May 201207:06 | – | metasploit |
![]() | Session fixation | 23 May 201315:55 | – | prion |
![]() | activeCollab Chat Module Arbitrary PHP Code Execution (CVE-2012-6554) | 5 Nov 201400:00 | – | checkpoint_advisories |
![]() | CVE-2012-6554 | 23 May 201315:00 | – | cvelist |
Source | Link |
---|---|
activecollab | www.activecollab.com/downloads/category/4/package/62/releases |
securityfocus | www.securityfocus.com/bid/53624 |
secunia | www.secunia.com/advisories/49246 |
exchange | www.exchange.xforce.ibmcloud.com/vulnerabilities/75741 |
exploit-db | www.exploit-db.com/exploits/18898 |
osvdb | www.osvdb.org/81966 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo