漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple PHP remote file inclusion vulnerabilities in openMairie openCimetiere 2.01, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the path_om parameter to (1) autorisation.class.php, (2) courrierautorisation.class.php, (3) droit.class.php, (4) profil.class.php, (5) temp_defunt_sansemplacement.class.php, (6) utils.class.php, (7) cimetiere.class.php, (8) defunt.class.php, (9) emplacement.class.php, (10) tab_emplacement.class.php, (11) temp_emplacement.class.php, (12) voie.class.php, (13) collectivite.class.php, (14) defunttransfert.class.php, (15) entreprise.class.php, (16) temp_autorisation.class.php, (17) travaux.class.php, (18) zone.class.php, (19) courrier.class.php, (20) dossier.class.php, (21) plans.class.php, (22) temp_defunt.class.php, and (23) utilisateur.class.php in obj/.
漏洞信息
N/A
漏洞
N/A
漏洞
openMairie openCimetiere 'path_om' 参数多个远程文件包含漏洞
漏洞信息
openMairie openCimetiere存在多个PHP远程文件包含漏洞,当register_globals被启用时,由于没有充分过滤多个脚本path_om参数的URL,远程攻击者可以通过多个脚本的path_om参数的URL执行任意PHP代码。这些脚本包含:(1) autorisation.class.php,(2) courrierautorisation.class.php,(3) droit.class.php,(4) profil.class.php,(5) temp_defunt_sans
漏洞信息
N/A
漏洞
N/A