1 results (0.005 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 4

Multiple PHP remote file inclusion vulnerabilities in FAQEngine 4.24.00 allow remote attackers to execute arbitrary PHP code via a URL in the path_faqe parameter to (1) attachs.php, (2) backup.php, (3) badwords.php, (4) categories.php, (5) changepw.php, (6) colorchooser.php, (7) colorwheel.php, (8) dbfiles.php, (9) diraccess.php, (10) faq.php, (11) index.php, (12) kb.php, and (13) stats.php. Múltiples vulnerabilidades de inclusion remota de fichero PHP en FAQEngine v4.24.00 permite a atacantes remotos ejecutar código PHP de forma arbitraria a travees de una URL en el parámetro "path_faq" a (1) attachs.php, (2) backup.php, (3) badwords.php, (4) categories.php, (5) changepw.php, (6) colorchooser.php, (7) colorwheel.php, (8) dbfiles.php, (9) diraccess.php, (10) faq.php, (11) index.php, (12) kb.php, y (13) stats.php. • https://www.exploit-db.com/exploits/11111 http://packetstormsecurity.org/1001-exploits/faqengine-rfi.txt http://www.exploit-db.com/exploits/11111 http://www.securityfocus.com/bid/37719 https://exchange.xforce.ibmcloud.com/vulnerabilities/55532 • CWE-94: Improper Control of Generation of Code ('Code Injection') •