"value":"Multiple PHP remote file inclusion vulnerabilities in ChronoEngine ChronoForms (com_chronocontact) 2.3.5 component for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) PPS/File.php, (2) Writer.php, and (3) PPS.php in excelwriter/; and (4) BIFFwriter.php, (5) Workbook.php, (6) Worksheet.php, and (7) Format.php in excelwriter/Writer/."
},
{
"lang":"es",
"value":"M\u00faltiples vulnerabilidades de inclusi\u00f3n de archivos PHP remotos en la componente ChronoEngine ChronoForms (com_chronocontact) 2.3.5 para Joomla!. Permiten a atacantes remotos ejecutar c\u00f3digo PHP arbitrario a trav\u00e9s de una URL en el par\u00e1metro mosConfig_absolute_path hacia (1) PPS/File.php, (2) Writer.php y (3) PPS.php en excelwriter/; y (4) BIFFwriter.php, (5) Workbook.php, (6) Worksheet.php y (7) Format.php en excelwriter/Writer/."