![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||||||||||||||||||||||||||
|
![]() |
![]() ![]() All Categories index.php in Francisco Burzi PHP-Nuke 5.3.1 and earlier allows remote attackers to execute arbitrary PHP code by specifying a URL to the malicious code in the file parameter.Category: WEB-PHP |
IPS Alert Level | ||
![]() |
||
Low |
Medium |
High |
![]() |
![]() |
![]() |
![]() |
![]() |
Home | Products | Applications | Markets | Support | How to Buy | Channel Partners | Company |
![]() |
![]() |
|
![]() |
![]() |
Comprehensive Internet Security ® 2003 SonicWALL, Inc. | Privacy Statement |