Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xrj9-vwwj-2w2c

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHP remote file inclusion vulnerability in admin/spaw/spaw_control.class.php in the XT-Conteudo module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.

PHP remote file inclusion vulnerability in admin/spaw/spaw_control.class.php in the XT-Conteudo module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.

EPSS

Процентиль: 98%
0.65863
Средний

Связанные уязвимости

nvd
больше 18 лет назад

PHP remote file inclusion vulnerability in admin/spaw/spaw_control.class.php in the XT-Conteudo module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.

EPSS

Процентиль: 98%
0.65863
Средний