Page 3 of 13 results (0.004 seconds)

CVSS: 5.1EPSS: 1%CPEs: 1EXPL: 1

Multiple PHP remote file inclusion vulnerabilities in Docebo 3.0.3 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in (1) GLOBALS[where_framework] to (a) admin/modules/news/news_class.php and (b) admin/modules/content/content_class.php, and (2) GLOBALS[where_cms] to (c) admin/modules/block_media/util.media.php. NOTE: this issue might be resultant from a global overwrite vulnerability. This issue is similar to CVE-2006-2576, but the vectors are different. Múltiples vulnerabilidades PHP de inclusión remota de archivo en Docebo v3.0.3 y versiones anteriores, cuando register_globals está habilitado, que permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en (1) GLOBALS [where_framework] para (a) admin / modules / news / news_class. php y (b) admin / modules / content / content_class.php, y (2) GLOBALS [where_cms] a (c) admin / modules / block_media / util.media.php. NOTA: este problema puede ser el resultado de una vulnerabilidad de sobreescritura de ámbito global. • http://securitytracker.com/id?1016259 http://www.osvdb.org/26707 http://www.osvdb.org/26708 http://www.osvdb.org/26709 https://exchange.xforce.ibmcloud.com/vulnerabilities/26633 •

CVSS: 5.1EPSS: 1%CPEs: 1EXPL: 2

Multiple PHP remote file inclusion vulnerabilities in Docebo 3.0.3 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in (1) where_cms, (2) where_lms, (3) where_upgrade, (4) BBC_LIB_PATH, and (5) BBC_LANGUAGE_PATH parameters in various unspecified scripts. NOTE: the provenance of some of this information is unknown; the details are obtained solely from third party information. • https://www.exploit-db.com/exploits/1817 http://secunia.com/advisories/20260 http://www.osvdb.org/25757 https://exchange.xforce.ibmcloud.com/vulnerabilities/26633 •

CVSS: 5.1EPSS: 2%CPEs: 1EXPL: 1

Multiple PHP remote file inclusion vulnerabilities in Docebo 3.0.3 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in (1) GLOBALS[where_framework] to (a) lib.simplesel.php, (b) lib.filelist.php, (c) tree.documents.php, (d) lib.repo.php, and (e) lib.php, and (2) GLOBALS[where_scs] to (f) lib.teleskill.php. NOTE: this issue might be resultant from a global overwrite vulnerability. • https://www.exploit-db.com/exploits/1817 http://archives.neohapsis.com/archives/bugtraq/2006-06/0113.html http://secunia.com/advisories/20260 http://www.osvdb.org/25757 http://www.osvdb.org/26711 http://www.vupen.com/english/advisories/2006/1935 https://exchange.xforce.ibmcloud.com/vulnerabilities/26633 •