Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vwmx-6456-487h

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHP remote file inclusion vulnerability in admin/spaw/spaw_control.class.php in the TinyContent 1.5 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.

PHP remote file inclusion vulnerability in admin/spaw/spaw_control.class.php in the TinyContent 1.5 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.

EPSS

Процентиль: 98%
0.62331
Средний

Связанные уязвимости

nvd
больше 18 лет назад

PHP remote file inclusion vulnerability in admin/spaw/spaw_control.class.php in the TinyContent 1.5 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.

EPSS

Процентиль: 98%
0.62331
Средний