漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
e107 0.75 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary PHP code via the tinyMCE_imglib_include image/jpeg parameter in e107_handlers/tiny_mce/plugins/ibrowser/ibrowser.php, as demonstrated by a multipart/form-data request. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in e107.
漏洞信息
N/A
漏洞
N/A
漏洞
e107 'ibrowser.php'执行任意PHP代码
漏洞信息
e107 0.75和更早版本,在输入数据包含的数值参数值与字母数字参数的杂凑值匹配时,未适当取消设置变量,远程攻击者可以通过e107_handlers/tiny_mce/plugins/ibrowser/ibrowser.php中的tinyMCE_imglib_include image/jpeg参数执行任意PHP代码,如通过多部分/形式的数据请求所示。
漏洞信息
N/A
漏洞
N/A