English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75516 CVE descriptions
and 39786 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.100018
Category:Web application abuses
Title:Golabi CMS 'index_logged.php' Remote File Include Vulnerability
Summary:Determine if Golabi CMS is vulnerable to Remote File Include
Description:

Overview:
Golabi CMS is prone to a remote file-include vulnerability because
it fails to sufficiently sanitize user-supplied data.

Exploiting this issue can allow an attacker to compromise the
application and the underlying computer
other attacks are also
possible.

Solution:
Upgrade to a newer version available at http://golabicms.sourceforge.net/
Cross-Ref: BugTraq ID: 33916
CopyrightThis script is Copyright (C) 2009 Greenbone Networks GmbH

This is only one of 39786 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.