7.5
CVSSv2

CVE-2008-1466

Published: 24/03/2008 Updated: 08/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 795
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple PHP remote file inclusion vulnerabilities in W-Agora 4.0 allow remote malicious users to execute arbitrary PHP code via a URL in the bn_dir_default parameter to (1) add_user.php, (2) create_forum.php, (3) create_user.php, (4) delete_notes.php, (5) delete_user.php, (6) edit_forum.php, (7) mail_users.php, (8) moderate_notes.php, and (9) reorder_forums.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

w-agora w-agora 4.0

Exploits

source: wwwsecurityfocuscom/bid/28366/info w-Agora is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible w-Agora 40 is vulnerable; ot ...
source: wwwsecurityfocuscom/bid/28366/info w-Agora is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible w-Agora 40 is ...
source: wwwsecurityfocuscom/bid/28366/info w-Agora is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible w-Agora 40 is vulnerable; ...
source: wwwsecurityfocuscom/bid/28366/info w-Agora is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible w-Agora 40 is vulnerable; other ...
source: wwwsecurityfocuscom/bid/28366/info w-Agora is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible w-Agora ...
source: wwwsecurityfocuscom/bid/28366/info w-Agora is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible w-Agora 40 is vu ...
source: wwwsecurityfocuscom/bid/28366/info w-Agora is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible w-Agora 40 is vulnerab ...
source: wwwsecurityfocuscom/bid/28366/info w-Agora is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible w-Agora 40 ...
source: wwwsecurityfocuscom/bid/28366/info w-Agora is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible w-Agora 40 is vulne ...