6.8
CVSSv2

CVE-2008-6132

Published: 13/02/2009 Updated: 29/09/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 690
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Eval injection vulnerability in reserve.php in phpScheduleIt 1.2.10 and previous versions, when magic_quotes_gpc is disabled, allows remote malicious users to execute arbitrary PHP code via the start_date parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

brickhost phpscheduleit 1.0_rc1

brickhost phpscheduleit 1.2.0

brickhost phpscheduleit 1.2.5

brickhost phpscheduleit 1.2.6

brickhost phpscheduleit 1.2.1

brickhost phpscheduleit 1.2.2

brickhost phpscheduleit 1.2.9

brickhost phpscheduleit 1.0.0rc1

brickhost phpscheduleit 1.0

brickhost phpscheduleit 1.2.3

brickhost phpscheduleit 1.2.4

brickhost phpscheduleit

brickhost phpscheduleit 1.2.7

brickhost phpscheduleit 1.2.8

Exploits

## # $Id: phpscheduleit_start_daterb 14073 2011-10-26 18:06:12Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/co ...
<?php /* ------------------------------------------------------------------- phpScheduleIt <= 1210 (reservephp) Remote Code Execution Exploit ------------------------------------------------------------------- author: EgiX mail: n0b0d13s[at]gmail[dot]com link: phpscheduleitsourceforgenet/ dork: inurl: ...