vendor:
Net_DNS
by:
ToXiC CreW
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Net_DNS
Affected Version From: Net_DNS-0.03
Affected Version To: Net_DNS-0.03
Patch Exists: YES
Related CWE: N/A
CPE: Net_DNS
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
Net_DNS: Remote File Inclusion by ToXiC CreW
Net_DNS is vulnerable to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. This URL can be used to execute arbitrary code on the vulnerable system.
Mitigation:
Input validation should be used to prevent malicious user-supplied input from being used to execute arbitrary code.