
CVE-2009-4156 – Ciamos CMS 0.9.5 - 'module_path' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2009-4156
02 Dec 2009 — PHP remote file inclusion vulnerability in modules/pms/index.php in Ciamos CMS 0.9.5 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the module_path parameter. Vulnerabilidad de inclusión remota de archivo PHP en modules/pms/index.php en Ciamos CMS v0.9.5 y anteriores permite a atacantes remotos ejecutar código PHP de su eleeción a través de una URL en el parámetro module_path. • https://www.exploit-db.com/exploits/10259 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2006-5257 – Ciamos CMS 0.9.6b - 'config.php' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-5257
12 Oct 2006 — PHP remote file inclusion vulnerability in modules/forum/include/config.php in Ciamos Content Management System (CMS) 0.9.6b and earlier allows remote attackers to execute arbitrary PHP code via a URL in the module_cache_path parameter. Vulnerabilidad de inclusión remota de archivo en modules/forum/include/config.php en Ciamos Content Management System (CMS) 0.9.6b y versiones anteriores permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro module_cache_path. • https://www.exploit-db.com/exploits/2489 •

CVE-2005-0827
https://notcve.org/view.php?id=CVE-2005-0827
22 Mar 2005 — Viewcat.php in (1) RUNCMS 1.1A, (2) Ciamos 0.9.2 RC1, e-Xoops 1.05 Rev3, and possibly other products based on e-Xoops (exoops), allow remote attackers to obtain sensitive information via an invalid parameter to the convertorderbytrans function, which reveals the path in a PHP error message. • http://marc.info/?l=bugtraq&m=111117182417422&w=2 •

CVE-2005-0828 – RunCMS 1.1 - Database Configuration Information Disclosure
https://notcve.org/view.php?id=CVE-2005-0828
22 Mar 2005 — highlight.php in (1) RUNCMS 1.1A, (2) CIAMOS 0.9.2 RC1, (3) e-Xoops 1.05 Rev3, and possibly other products based on e-Xoops (exoops), allows remote attackers to read arbitrary PHP files by specifying the pathname in the file parameter, as demonstrated by reading database configuration information from mainfile.php. • https://www.exploit-db.com/exploits/25237 •