[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-5762Date: (C)2006-11-06   (M)2023-12-22


PHP remote file inclusion vulnerability in forgot_pass.php in Free File Hosting 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter. NOTE: this issue was later reported for the "File Upload System" which is a component of Free File Hosting. This also affects Free Image Hosting 2.0, which contains the same code.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.1
Exploit Score: 4.9
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
http://www.securityfocus.com/archive/1/archive/1/463707/100/0/threaded
VIM-20070327
http://www.attrition.org/pipermail/vim/2007-March/001473.html
BID-20781
SECUNIA-22594
BID-23118
EXPLOIT-DB-2670
OSVDB-30143
EXPLOIT-DB-3568
ADV-2006-4228
freefile-forgot-file-include(29874)
freeimagehosting-adbodytemp-file-include(33196)
http://www.rahim.webd.pl/exploity/Exploits/111.txt

CWE    1
CWE-94

© SecPod Technologies