Multiple PHP remote file inclusion vulnerabilities in Meet#Web 0.8 allow remote malicious users to execute arbitrary PHP code via a URL in the root_path parameter to (1) modules.php, (2) ManagerResource.class.php, (3) ManagerRightsResource.class.php, (4) RegForm.class.php, (5) RegResource.class.php, and (6) RegRightsResource.class.php in classes/. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
meet\\#web meet\\#web 0.8 |