RSS   Podatności dla 'Sapid blog beta 2'   RSS



Multiple PHP remote file inclusion vulnerabilities in Csaba Godor SAPID Blog Beta 2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) root_path parameter to (a) usr/extensions/, (b) usr/extensions/, or (c) usr/extensions/; or the (2) GLOBALS[root_path] parameter to (d) usr/extensions/


Copyright 2021,


Back to Top