"value":"Multiple PHP remote file inclusion vulnerabilities in Study planner (Studiewijzer) 0.15 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the SPL_CFG[dirroot] parameter to (1) service.alert.inc.php or (2) settings.ses.php in inc/; (3) db/mysql/db.inc.php; (4) integration/shortstat/configuration.php; (5) ali.class.php or (6) cat.class.php in methodology/traditional/class/; (7) cat_browse.inc.php, (8) chr_browse.inc.php, (9) chr_display.inc.php, or (10) dash_browse.inc.php in methodology/traditional/ui/inc/; (11) spl.webservice.php or (12) konfabulator/gateway_admin.php in ws/; or other unspecified files."
},
{
"lang":"es",
"value":"Multiples vulnerabilidades PHP de inclusi\u00f3n remota de archivo en Study planner (Studiewijzer) 0.15 y anteriores, cuando register_globals est\u00e1 habilitado, permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a tav\u00e9s de una URL en el par\u00e1metro SPL_CFG[dirroot] en (1) service.alert.inc.php o (2) settings.ses.php en inc/;(3) db/mysql/db.inc.php; (4) integration/shortstat/configuration.php; (5) ali.class.php o (6) cat.class.php en methodology/traditional/class/; (7) cat_browse.inc.php, (8) chr_browse.inc.php, (9) chr_display.inc.php, o (10) dash_browse.inc.php en methodology/traditional/ui/inc/; (11) spl.webservice.php o (12) konfabulator/gateway_admin.php en ws/;o otros archivos no especificados."