• Skip to main content

Audit My PC - Free Internet Security Audit

Firewall Test and web tools to check your security and privacy

  • Firewall Test
  • Anti Spam
  • Internet Speed Test
  • Sitemap Generator
  • Whats My IP

PAJAX pajax_call_dispatcher.php Arbitrary PHP Code Execution

Network Security News – Saturday, April 15, 2006 Events

PAJAX pajax_call_dispatcher.php Arbitrary PHP Code Execution

PAJAX contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when PHP code is included in the 'method' and 'args' variables. This flaw may lead to a loss of integrity.. Read more at osvdb.org/24618

Indexu Multiple Script theme_path Variable Remote File Inclusion

Indexu contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to multiple scripts not properly sanitizing user input supplied to the 'theme_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.. Read more at osvdb.org/24596

Indexu invoice.php base_path Variable Remote File Inclusion

Indexu contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to invoice.php not properly sanitizing user input supplied to the 'base_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.. Read more at osvdb.org/24597

Copyright © 2001-2024 Audit My PC .com All Rights Reserved. Our Privacy Policy and TOS

  • About