"value":"Multiple directory traversal vulnerabilities in Blogplus 1.0 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) row_mysql_blocks_center_down[file] parameter to includes/block_center_down.php; (2) row_mysql_blocks_center_top[file] includes/parameter to block_center_top.php; (3) row_mysql_blocks_left[file] parameter to includes/block_left.php; (4) row_mysql_blocks_right[file] parameter to includes/block_right.php; and row_mysql_bloginfo[theme] parameter to (5) includes/window_down.php and (6) includes/window_top.php."
},
{
"lang":"es",
"value":"M\u00faltiples vulnerabilidades de salto de directorio en Blogplus v1.0 permiten a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n a trav\u00e9s de .. (punto punto) en el par\u00e1metro (1) row_mysql_blocks_center_down[file] de includes/block_center_down.php; (2) par\u00e1metro row_mysql_blocks_center_top[fichero] includes/ de block_center_top.php; (3) par\u00e1metro row_mysql_blocks_left[file] de includes/block_left.php; (4) par\u00e1metro row_mysql_blocks_right[file] de includes/block_right.php; y par\u00e1metro row_mysql_bloginfo[theme] de (5) includes/window_down.php y (6) includes/window_top.php."