"value":"Multiple PHP remote file inclusion vulnerabilities in DataLife Engine (DLE) 8.3 allow remote attackers to execute arbitrary PHP code via a URL in (1) the selected_language parameter to engine/inc/include/init.php, (2) the config[langs] parameter to engine/inc/help.php, (3) the config[lang] parameter to engine/ajax/pm.php, (4) and the _REQUEST[skin] parameter to engine/ajax/addcomments.php."
},
{
"lang":"es",
"value":"M\u00faltiples vulnerabilidades de inclusi\u00f3n de archivos en DataLife Engine (DLE) v8.3 permite a atacantes remotos ejecutar c\u00f3digo aleatorio PHP a trav\u00e9s de una URL en los par\u00e1metros (1) the selected_language de engine/inc/include/init.php, (2) config[langs] parameter de engine/inc/help.php, (3) config[lang] de engine/ajax/pm.php y (4) the _REQUEST[skin] de engine/ajax/addcomments.php."