"value":"Multiple PHP remote file inclusion vulnerabilities in Download-Engine 1.4.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) eng_dir parameter to addmember.php, (2) lang_path parameter to admin/enginelib/class.phpmailer.php, and the (3) spaw_root parameter to admin/includes/spaw/dialogs/colorpicker.php, different vectors than CVE-2006-5291 and CVE-2006-5459. NOTE: vector 3 might be an issue in SPAW."
},
{
"lang":"es",
"value":"M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en Download-Engine 1.4.3 permiten a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en (1) el par\u00e1metro eng_dir en addmember.php, (2) el par\u00e1metro lang_path en admin/enginelib/class.phpmailer.php, y (3) el par\u00e1metro spaw_root en admin/includes/spaw/dialogs/colorpicker.php, vectores distintos a CVE-2006-5291 and CVE-2006-5459.\r\nNOTA: El vector 3 podr\u00eda ser un tema de discusi\u00f3n de SPAW."