7.5
CVSSv2

CVE-2006-5021

Published: 27/09/2006 Updated: 05/09/2008
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 770
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple PHP remote file inclusion vulnerabilities in redgun RedBLoG 0.5 allow remote malicious users to execute arbitrary PHP code via a URL in (1) the root parameter in imgen.php, and the root_path parameter in (2) admin/config.php, (3) common.php, and (4) admin/index.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

redblog redblog 0.5

Exploits

source: wwwsecurityfocuscom/bid/20115/info The redblog application is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible wwwe ...
source: wwwsecurityfocuscom/bid/20115/info The redblog application is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible wwwexamp ...
source: wwwsecurityfocuscom/bid/20115/info The redblog application is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible wwwexa ...
source: wwwsecurityfocuscom/bid/20115/info The redblog application is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible www ...