Field | 03/19/2015 12:22 PM | 03/23/2019 03:59 PM |
---|
cvss2_nvd_av | N | N |
cvss2_nvd_ac | M | M |
cvss2_nvd_au | N | N |
cvss2_nvd_ci | P | P |
cvss2_nvd_ii | P | P |
cvss2_nvd_ai | P | P |
cvss3_meta_basescore | 7.3 | 7.3 |
cvss3_meta_tempscore | 6.6 | 6.6 |
cvss3_vuldb_basescore | 7.3 | 7.3 |
cvss3_vuldb_tempscore | 6.6 | 6.6 |
sourcecode | function show($tpl, $array)
{
global $tmpdir;
$template = "../inc/_templates_/".$tmpdir."/".$tpl;
if($fp = @fopen($template.".".html, "r"))
$tpl = @fread($fp, filesize($template.".".html));
$array['dir'] = '../inc/_templates_/'.$tmpdir;
foreach($array as $value => $code)
{
$tpl = str_replace('['.$value.']', $code, $tpl);
}
return $tpl;
} | function show($tpl, $array)
{
global $tmpdir;
$template = "../inc/_templates_/".$tmpdir."/".$tpl;
if($fp = @fopen($template.".".html, "r"))
$tpl = @fread($fp, filesize($template.".".html));
$array['dir'] = '../inc/_templates_/'.$tmpdir;
foreach($array as $value => $code)
{
$tpl = str_replace('['.$value.']', $code, $tpl);
}
return $tpl;
} |
date | 1268611200 (03/15/2010) | 1268611200 (03/15/2010) |
url | http://www.vupen.com/english/advisories/2010/0615 | http://www.vupen.com/english/advisories/2010/0615 |
availability | 1 | 1 |
date | 1268611200 (03/15/2010) | 1268611200 (03/15/2010) |
publicity | 1 | 1 |
url | https://www.exploit-db.com/exploits/11735 | https://www.exploit-db.com/exploits/11735 |
developer_nickname | cr4wl3r | cr4wl3r |
language | PHP | PHP |
price_0day | $0-$5k | $0-$5k |
name | Upgrade | Upgrade |
date | 1268697600 (03/16/2010) | 1268697600 (03/16/2010) |
upgrade_version | 1.5.4 | 1.5.4 |
cve | CVE-2010-0966 | CVE-2010-0966 |
cve_nvd_published | 1268697600 | 1268697600 |
cve_nvd_summary | PHP remote file inclusion vulnerability in inc/config.php in deV!L`z Clanportal (DZCP) 1.5.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the basePath parameter. | PHP remote file inclusion vulnerability in inc/config.php in deV!L`z Clanportal (DZCP) 1.5.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the basePath parameter. |
osvdb | 62924 | 62924 |
osvdb_create | 1268669378 | 1268669378 |
osvdb_title | deV!L'z Clanportal inc/config.php basePath Parameter Remote File Inclusion | deV!L'z Clanportal inc/config.php basePath Parameter Remote File Inclusion |
secunia | 38902 | 38902 |
secunia_date | 1268611200 (03/15/2010) | 1268611200 (03/15/2010) |
secunia_title | deV!L'z Clanportal "basePath" File Inclusion Vulnerability | deV!L'z Clanportal "basePath" File Inclusion Vulnerability |
secunia_risk | Highly Critical | Highly Critical |
exploitdb | 11735 | 11735 |
misc | https://secdb.tenold.org/cves/CVE-2010-0966 | https://secdb.tenold.org/cves/CVE-2010-0966 |
cvss3_vuldb_ui | N | N |
location | Website | Website |
cvss2_vuldb_e | POC | POC |
cvss2_vuldb_rl | OF | OF |
cvss2_vuldb_rc | ND | ND |
cvss3_vuldb_e | P | P |
cvss3_vuldb_rl | O | O |
cvss3_vuldb_rc | X | X |
reaction_days | 1 | 1 |
exposure_days | 1 | 1 |
cvss3_vuldb_av | N | N |
cvss3_vuldb_ac | L | L |
cvss3_vuldb_pr | N | N |
cvss3_vuldb_s | U | U |
cvss3_vuldb_c | L | L |
cvss3_vuldb_i | L | L |
cvss3_vuldb_a | L | L |
vendor | DZCP | DZCP |
name | deV!L`z Clanportal | deV!L`z Clanportal |
version | 1.5.2 | 1.5.2 |
file | inc/config.php | inc/config.php |
argument | basePath | basePath |
cwe | 94 (code injection) | 94 (code injection) |
risk | 2 | 2 |
cvss2_vuldb_basescore | 6.8 | 6.8 |
cvss2_vuldb_tempscore | 5.3 | 5.3 |
cvss2_vuldb_av | N | N |
cvss2_vuldb_ac | M | M |
cvss2_vuldb_au | N | N |
cvss2_vuldb_ci | P | P |
cvss2_vuldb_ii | P | P |
cvss2_vuldb_ai | P | P |
cve_assigned | | 1268697600 (03/16/2010) |
vupen | | ADV-2010-0615 |