2 results (0.004 seconds)

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 2

PHP remote file inclusion vulnerability in modules/Discipline/CategoryBreakdownTime.php in Focus/SIS 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the FocusPath parameter. Vulnerabilidad de inclusión remota de archivo en PHP en modules/Discipline/CategoryBreakdownTime.php de Focus/SIS 1.0 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro FocusPath. • https://www.exploit-db.com/exploits/4377 http://secunia.com/advisories/26750 http://www.attrition.org/pipermail/vim/2007-September/001788.html http://www.osvdb.org/36952 http://www.securityfocus.com/bid/25603 http://www.vupen.com/english/advisories/2007/3134 https://exchange.xforce.ibmcloud.com/vulnerabilities/36521 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 2

Multiple PHP remote file inclusion vulnerabilities in Focus/SIS 2.2 allow remote attackers to execute arbitrary PHP code via a URL in the staticpath parameter to (1) modules/Discipline/CategoryBreakdownTime.php or (2) modules/Discipline/StudentFieldBreakdown.php. Múltiples vulnerabilidades de inclusión remota de archivo en PHP en Focux/SIS 2.2 permiten a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro staticpath de (1) modules/Discipline/CategoryBreakdownTime.php o (2) modules/Discipline/StudentFieldBreakdown.php. • https://www.exploit-db.com/exploits/4377 http://secunia.com/advisories/26775 http://www.osvdb.org/36997 http://www.osvdb.org/36998 http://www.securityfocus.com/bid/25603 http://www.vupen.com/english/advisories/2007/3133 https://exchange.xforce.ibmcloud.com/vulnerabilities/36523 • CWE-94: Improper Control of Generation of Code ('Code Injection') •