漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple PHP remote file inclusion vulnerabilities in DynPG CMS 4.1.0, and possibly earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) DefineRootToTool parameter to counter.php, (2) PathToRoot parameter to plugins/DPGguestbook/guestbookaction.php and (3) get_popUpResource parameter to backendpopup/popup.php. NOTE: some of these details are obtained from third party information.
漏洞信息
N/A
漏洞
N/A
漏洞
DynPG CMS 多个远程文件包含漏洞
漏洞信息
DynPG CMS中存在多个PHP远程文件包含漏洞。当禁用magic_quotes_gpc和启用register_globals时,远程攻击者可以借助URL执行任意的PHP代码,包括: (1)脚本counter.php的DefineRootToTool参数; (2)脚本plugins/DPGguestbook/guestbookaction.php的PathToRoot参数; (3)脚本backendpopup/popup.php的get_popUpResource参数。
漏洞信息
N/A
漏洞
N/A