Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-557r-mpfm-f4j6

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.

index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.

EPSS

Процентиль: 88%
0.03695
Низкий

Связанные уязвимости

nvd
около 19 лет назад

index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.

EPSS

Процентиль: 88%
0.03695
Низкий