PHP remote file inclusion vulnerability in Webspotblogging 3.0.1 allows remote malicious users to execute arbitrary PHP code via a URL in the path parameter to (1) inc/logincheck.inc.php, (2) inc/adminheader.inc.php, (3) inc/global.php, or (4) inc/mainheader.inc.php. NOTE: some of these vectors were also reported for 3.0 in a separate disclosure.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
webspot webspotblogging 3.0 |
||
webspot webspotblogging 3.0.1 |