漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple directory traversal vulnerabilities in PowerAward 1.1.0 RC1, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the lang parameter to (1) agb.php, (2) angemeldet.php, (3) anmelden.php, (4) charts.php, (5) external_vote.php, (6) guestbook.php, (7) impressum.php, (8) index.php, (9) rss-reader.php, (10) statistic.php, (11) teilnehmer.php, (12) topsites.php, (13) votecode.php, (14) voting.php, and (15) winner.php.
漏洞信息
N/A
漏洞
N/A
漏洞
PowerAward多个本地文件目录遍历漏洞
漏洞信息
PowerAward 1.1.0 RC1的多个目录遍历漏洞,当 register_globals被激活时,允许远程攻击者借助(1) agb.php,(2) angemeldet.php,(3) anmelden.php,(4) charts.php,(5) external_vote.php, (6) guestbook.php,(7) impressum.php,(8) index.php,(9) rss-reader.php,(10) statistic.php,(11) teilnehmer.php
漏洞信息
N/A
漏洞
N/A