PHP remote file inclusion vulnerability in includes/header.php in Groone GLinks 2.1 allows remote attackers to execute arbitrary PHP code via a URL in the abspath parameter.
                
            References
                    | Link | Resource | 
|---|---|
| http://secunia.com/advisories/33649 | Vendor Advisory | 
| http://www.securityfocus.com/bid/33578 | Exploit | 
| https://www.exploit-db.com/exploits/7954 | |
| http://secunia.com/advisories/33649 | Vendor Advisory | 
| http://www.securityfocus.com/bid/33578 | Exploit | 
| https://www.exploit-db.com/exploits/7954 | 
Configurations
                    History
                    No history.
Information
                Published : 2009-02-10 07:00
Updated : 2025-04-09 00:30
NVD link : CVE-2009-0463
Mitre link : CVE-2009-0463
CVE.ORG link : CVE-2009-0463
JSON object : View
Products Affected
                groonesworld
- glinks
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
