Be in love with vulnerability scanning
Mageni is a powerful and easy vulnerability scanner used by companies of all sizes. You will be in love with Mageni's powerful features, ease of use and price. Free for 7-days then $39 monthly for infinite IPs.Start now
No Contracts, Cancel at Anytime and 7-days Money-Back Guarantee.
Multiple PHP remote file inclusion vulnerabilities in pSlash 0.70 allow remote attackers to execute arbitrary PHP code via a URL in (1) the lvc_admin_dir parameter to modules/visitors2/admin/view-archiver.inc.php or (2) the lvc_include_dir parameter to modules/visitors2/include/menus.inc.php. NOTE: the modules/visitors2/include/config.inc.php vector is already covered by CVE-2006-4373. NOTE: vector 1 is disputed by CVE because PHP encounters a fatal instantiation error on a direct request for the file, before reaching the include statement..
- Base Score
- Exploit Score
- Access Vector
- Access Complexity
- Authentication Required
- Impact Score
- Confidentiality Impact
- Availability Impact
- Integrity Impact
Every 11 seconds there is a ransomware attack.
Mageni can help you manage this threat by understanding your vulnerabilities and prioritizing the remediation.Sign up for free