2 results (0.009 seconds)

CVSS: 7.5EPSS: 37%CPEs: 1EXPL: 23

Multiple PHP remote file inclusion vulnerabilities in Content*Builder 0.7.5 allow remote attackers to execute arbitrary PHP code via a URL with a trailing slash (/) character in the (1) lang_path parameter to (a) cms/plugins/col_man/column.inc.php, (b) cms/plugins/poll/poll.inc.php, (c) cms/plugins/user_managment/usrPortrait.inc.php, (d) cms/plugins/user_managment/user.inc.php, (e) cms/plugins/media_manager/media.inc.php, (f) cms/plugins/events/permanent.eventMonth.inc.php, (g) cms/plugins/events/events.inc.php, and (h) cms/plugins/newsletter2/newsletter.inc.php; (2) path[cb] parameter to (i) modules/guestbook/guestbook.inc.php, (j) modules/shoutbox/shoutBox.php, and (k) modules/sitemap/sitemap.inc.php; and the (3) rel parameter to (l) modules/download/overview.inc.php, (m) modules/download/detailView.inc.php, (n) modules/article/fullarticle.inc.php, (o) modules/article/comments.inc.php, (p) modules/article2/overview.inc.php, (q) modules/article2/fullarticle.inc.php, (r) modules/article2/comments.inc.php, (s) modules/headline/headlineBox.php, and (t) modules/headline/showHeadline.inc.php. Múltiples vulnerabilidades de inclusión remota de archivo PHP en Content*Builder 0.7.5 permiten a atacantes remotos ejecutar código PHP arbitrario a través de una URL con un carácter de barra inclinada (/) en el parámetro (1) lang_path para (a) cms/plugins/col_man/column.inc.php, (b) cms/plugins/poll/poll.inc.php, (c) cms/plugins/user_managment/usrPortrait.inc.php, (d) cms/plugins/user_managment/user.inc.php, (e) cms/plugins/media_manager/media.inc.php, (f) cms/plugins/events/permanent.eventMonth.inc.php, (g) cms/plugins/events/events.inc.php y (h) cms/plugins/newsletter2/newsletter.inc.php; parámetro (2) path[cb] para (i) modules/guestbook/guestbook.inc.php, (j) modules/shoutbox/shoutBox.php y (k) modules/sitemap/sitemap.inc.php; y el parámetro (3) rel para (l) modules/download/overview.inc.php, (m) modules/download/detailView.inc.php, (n) modules/article/fullarticle.inc.php, (o) modules/article/comments.inc.php, (p) modules/article2/overview.inc.php, (q) modules/article2/fullarticle.inc.php, (r) modules/article2/comments.inc.php, (s) modules/headline/headlineBox.php y (t) modules/headline/showHeadline.inc.php. • https://www.exploit-db.com/exploits/1903 http://marc.info/?l=bugtraq&m=115016951316696&w=2 http://secunia.com/advisories/20557 http://www.osvdb.org/26344 http://www.osvdb.org/26345 http://www.osvdb.org/26346 http://www.osvdb.org/26347 http://www.osvdb.org/26348 http://www.osvdb.org/26349 http://www.osvdb.org/26350 http://www.osvdb.org/26351 http://www.osvdb.org/26352 http://www.osvdb.org/26353 http://www.osvdb.org/26354 http:&#x • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 6%CPEs: 1EXPL: 1

Multiple PHP remote file inclusion vulnerabilities in Content*Builder 0.7.5 allow remote attackers to execute arbitrary PHP code via a URL in the (1) path[cb] parameter to (a) libraries/comment/postComment.php and (b) modules/poll/poll.php, (2) rel parameter to (c) modules/archive/overview.inc.php, and the (3) actualModuleDir parameter to (d) modules/forum/showThread.inc.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information. • https://www.exploit-db.com/exploits/30634 http://secunia.com/advisories/20557 http://www.securityfocus.com/archive/1/481435/100/0/threaded http://www.securityfocus.com/bid/25914 https://exchange.xforce.ibmcloud.com/vulnerabilities/27044 •