Skip to main content
定价企业版
首页/漏洞/EDB-4685
EDB-4685webappsphp已验证

Rayzz Script 2.0 - Local/Remote File Inclusion

Crackers_Child12/1/2007
在Exploit-DB查看在GitLab查看源代码

AI分析AI驱动

漏洞利用代码

Exploit code not available in database

在GitLab查看源代码

相关CVE (2)

CVE-2007-6230

NONE

Directory traversal vulnerability in common/classes/class_HeaderHandler.lib.php in Rayzz Script 2.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the CFG[s

Directory traversal vulnerability in common/classes/class_HeaderHandler.lib.php in Rayzz Script 2.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the CFG[s...

12/4/2007CWE-22

CVE-2007-6229

NONE

PHP remote file inclusion vulnerability in common/classes/class_HeaderHandler.lib.php in Rayzz Script 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the CFG[site][project_path]

PHP remote file inclusion vulnerability in common/classes/class_HeaderHandler.lib.php in Rayzz Script 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the CFG[site][project_path]...

12/4/2007CWE-94

漏洞利用信息

EDB ID
4685
类型
webapps
平台
php
已验证
是
发布日期
2007-12-01

关联的CVE

CVE-2007-6230CVE-2007-6229

快速操作

下载原始文件在Google搜索
免责声明:此漏洞利用代码仅供教育和授权的安全研究目的使用。请负责任地使用,并仅在您有权测试的系统上使用。