Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in TagIt! Tagboard 2.1.B Build 2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) configpath parameter to (a) tagviewer.php, (b) tag_process.php, and (c) CONFIG/errmsg.inc.php; and (d) addTagmin.php, (e) ban_watch.php, (f) delTagmin.php, (g) delTag.php, (h) editTagmin.php, (i) editTag.php, (j) manageTagmins.php, and (k) verify.php in tagmin/; the (2) adminpath parameter to (l) tagviewer.php, (m) tag_process.php, and (n) tagmin/index.php; and the (3) admin parameter to (o) readconf.php, (p) updateconf.php, (q) updatefilter.php, and (r) wordfilter.php in tagmin/; different vectors than CVE-2006-5249.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
TagIt! Tagboard 多个PHP远程文件包含漏洞
Vulnerability Description
TagIt! Tagboard 2.1.B Build 2版本及其早期版本中存在多个PHP远程文件包含漏洞。当register_globals被激活时,远程攻击者执行任意PHP代码可以借助一个URL,且该URL包含于(1)对(a)tagviewer.php,(b)tag_process.php,以及(c)CONFIG/errmsg.inc.php的configpath参数;和(d)addTagmin.php,(e)ban_watch.php,(f)delTagmin.php,(g)delTag.php,(
CVSS Information
N/A
Vulnerability Type
N/A