Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-46cj-j92w-jf4m

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHP remote file inclusion vulnerability in include/wysiwyg/spaw_control.class.php in the icontent 4.5 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.

PHP remote file inclusion vulnerability in include/wysiwyg/spaw_control.class.php in the icontent 4.5 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.

EPSS

Процентиль: 98%
0.65489
Средний

Связанные уязвимости

nvd
больше 18 лет назад

PHP remote file inclusion vulnerability in include/wysiwyg/spaw_control.class.php in the icontent 4.5 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.

EPSS

Процентиль: 98%
0.65489
Средний