Vulnerability Description
PHP remote file inclusion vulnerability in inc/common.inc.php in Epistemon 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the inc_path parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Epistemon | Epistemon | 1.0 |
References
- http://osvdb.org/31938
- http://secunia.com/advisories/24003
- http://www.attrition.org/pipermail/vim/2007-February/001266.htmlExploit
- http://www.securityfocus.com/bid/22360Exploit
- http://www.vupen.com/english/advisories/2007/0459
- https://www.exploit-db.com/exploits/3247
- http://osvdb.org/31938
- http://secunia.com/advisories/24003
- http://www.attrition.org/pipermail/vim/2007-February/001266.htmlExploit
- http://www.securityfocus.com/bid/22360Exploit
- http://www.vupen.com/english/advisories/2007/0459
- https://www.exploit-db.com/exploits/3247
FAQ
What is CVE-2007-0701?
CVE-2007-0701 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP remote file inclusion vulnerability in inc/common.inc.php in Epistemon 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the inc_path parameter.
How severe is CVE-2007-0701?
CVE-2007-0701 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-0701?
Check the references section above for vendor advisories and patch information. Affected products include: Epistemon Epistemon.