漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple PHP remote file inclusion vulnerabilities in Brian Fraval Hitweb 3.0 allow remote attackers to execute arbitrary PHP code via a URL in the REP_CLASS parameter to (1) index.php, (2) arbo.php, (3) framepoint.php, (4) genpage.php, (5) lienvalider.php, (6) appreciation.php, (7) partenariat.php, (8) rechercher.php, (9) projet.php, (10) propoexample.php, (11) refererpoint.php, or (12) top50.php. NOTE: this issue has been disputed by a third party researcher, stating that REP_CLASS is initialized in an included file before being used
漏洞信息
N/A
漏洞
N/A
漏洞
Brian Fraval Hitweb 多个PHP远程文件包含漏洞
漏洞信息
Brian Fraval Hitweb 3.0中存在多个PHP远程文件包含漏洞,远程攻击者可以通过(1)index.php, (2)arbo.php, (3) framepoint.php, (4)genpage.php, (5)lienvalider.php, (6) appreciation.php, (7)partenariat.php, (8)rechercher.php, (9) projet.php, (10)propoexample.php, (11)refererpoint.php或(12
漏洞信息
N/A
漏洞
N/A