Multiple PHP remote file inclusion vulnerabilities in SpeedTech PHP Library (STPHPLibrary) 0.8.0 allow remote attackers to execute arbitrary PHP code via a URL in the STPHPLIB_DIR parameter to (1) stphpapplication.php, (2) stphpbtnimage.php, or (3) stphpform.php.
Attack Vector (AV) | Network | Adjacent | Local |
---|---|---|---|
Access Complexity (AC) | Low | Medium | High |
Authentication (Au) | None | Single | Multiple |
Confidentiality (C) | None | Parical | Complete |
Integrity (I) | None | Partial | Complete |
Availability (A) | None | Partial | Complete |
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: PHP(52 tweets)
Name | URL |
---|---|
No Data |
Name | URL |
---|---|
No Data |