漏洞标题
N/A
漏洞描述信息
FAQEngine 4.24.00 中的多个 PHP 远程文件包含漏洞允许远程攻击者通过路径_faqe 参数中的 URL 执行任意 PHP 代码,这些代码可以访问(1) attachs.php,(2) backup.php,(3) badwords.php,(4) categories.php,(5) changepw.php,(6) colorchooser.php,(7) colorwheel.php,(8) dbfiles.php,(9) diraccess.php,(10) faq.php,(11) index.php,(12) kb.php 和(13) stats.php。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
Multiple PHP remote file inclusion vulnerabilities in FAQEngine 4.24.00 allow remote attackers to execute arbitrary PHP code via a URL in the path_faqe parameter to (1) attachs.php, (2) backup.php, (3) badwords.php, (4) categories.php, (5) changepw.php, (6) colorchooser.php, (7) colorwheel.php, (8) dbfiles.php, (9) diraccess.php, (10) faq.php, (11) index.php, (12) kb.php, and (13) stats.php.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Boesch-It FAQEngine多个'path_faqe'参数PHP远程文件包含漏洞
漏洞描述信息
FAQEngine 多个path_faqe参数存在PHP远程文件包含漏洞。远程攻击者可以借助多个脚本的path_faqe参数的URL执行任意的PHP代码。这些脚本包括:(1) attachs.php、 (2) backup.php、 (3) badwords.php、 (4) categories.php、 (5) changepw.php、 (6) colorchooser.php、 (7) colorwheel.php、 (8) dbfiles.php、 (9) diraccess.php、 (10)
CVSS信息
N/A
漏洞类别
代码注入