source: http://www.securityfocus.com/bid/28142/info SID (Specimen Image Database) is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied input. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible. http://www.example.com/SID_box_notns_path/taxonservice.php?dir=shell.txt?
Related ExploitsTrying to match CVEs (1): CVE-2008-7152
Trying to match OSVDBs (1): 57646
Other Possible E-DB Search Terms: Specimen Image Database
|2006-10-16||2576||Specimen Image Database - 'client.php' Remote File Inclusion||Kw3[R]Ln|