Description
Multiple PHP remote file inclusion vulnerabilities in J-Pierre DEZELUS Les Visiteurs 2.0.1, as used in phpMyConferences (phpMyConference) 8.0.2 and possibly other products, allow remote attackers to execute arbitrary PHP code via a URL in the lvc_include_dir parameter to (1) config.inc.php or (2) new-visitor.inc.php in common/visiteurs/include/.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Matthieu Peschaud · textwebappsphp
https://www.exploit-db.com/exploits/23302
References (8)
Core 8
Core References
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_osvdb
http://www.osvdb.org/3586
Exploit, Patch mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2003-10/0262.html
Exploit, Patch vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1008011
Vendor Advisory vdb-entry
x_refsource_osvdb
http://www.osvdb.org/2717
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/8902
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1017065
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/13529
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10079
Scores
EPSS
0.0838
EPSS Percentile
92.4%
Details
Status
published
Products (1)
les_visiteurs/les_visiteurs
2.0.1
Published
Oct 25, 2003
Tracked Since
Feb 18, 2026