3 results (0.002 seconds)

CVSS: 6.8EPSS: 58%CPEs: 4EXPL: 4

PHP remote file inclusion vulnerability in lib/pcltar.lib.php (aka pcltar.php) in the PclTar module 1.3 and 1.3.1 for Vincent Blavet PhpConcept Library, as used in multiple products including (1) Joomla! 1.5.0 Beta, (2) N/X Web Content Management System (WCMS) 4.5, (3) CJG EXPLORER PRO 3.3, and (4) phpSiteBackup 0.1, allows remote attackers to execute arbitrary PHP code via a URL in the g_pcltar_lib_dir parameter. Una vulnerabilidad de inclusión remota de archivos PHP en lib/pcltar.lib.php (también se conoce como pcltar.php) en el módulo PclTar versiones 1.3 y 1.3.1 para la Biblioteca PhpConcept de Vincent Blavet, tal como se utiliza en varios productos, incluido (1) Joomla! versión 1.5.0 Beta, (2) N/X Web Content Management System (WCMS) versión 4.5, (3) CJG EXPLORER PRO versión 3.3, y (4) phpSiteBackup versión 0.1, permite a atacantes remotos ejecutar código PHP arbitrario por medio de una URL en el parámetro g_pcltar_lib_dir . • https://www.exploit-db.com/exploits/3915 https://www.exploit-db.com/exploits/3781 https://www.exploit-db.com/exploits/4111 http://osvdb.org/34803 http://osvdb.org/36009 http://secunia.com/advisories/25230 http://www.attrition.org/pipermail/vim/2007-May/001618.html http://www.hackers.ir/advisories/joomla.html http://www.securityfocus.com/archive/1/466687/100/0/threaded http://www.securityfocus.com/archive/1/478503/100/0/threaded http://www.securityfocus.com/ • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.1EPSS: 2%CPEs: 2EXPL: 2

PHP remote file inclusion vulnerability in wwwdev/nxheader.inc.php in N/X 2002 Professional Edition Web Content Management System (WCMS) 4.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the c[path] parameter. Vulnerabilidad de inclusión remota de archivo en PHP en wwwdev/nxheader.inc.php de N/X 2002 Professional Edition Web Content Management System (WCMS) 4.1 y anteriores permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro c[path]. • https://www.exploit-db.com/exploits/2659 http://secunia.com/advisories/22627 http://www.securityfocus.com/bid/20773 http://www.vupen.com/english/advisories/2006/4227 •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 4

The (1) menu.inc.php, (2) datasets.php and (3) mass_operations.inc.php (mistakenly referred to as mass_opeations.inc.php) scripts in N/X 2002 allow remote attackers to execute arbitrary PHP code via a c_path that references a URL on a remote web server that contains the code. • https://www.exploit-db.com/exploits/22116 https://www.exploit-db.com/exploits/22115 http://archives.neohapsis.com/archives/bugtraq/2003-01/0005.html http://secunia.com/advisories/7808 http://www.iss.net/security_center/static/10969.php http://www.securityfocus.com/bid/6500 •