"value":"Multiple PHP remote file inclusion vulnerabilities in Mindmeld 1.2.0.10 allow remote attackers to execute arbitrary PHP code via a URL in the MM_GLOBALS[home] parameter to (1) acweb/admin_index.php; and (2) ask.inc.php, (3) learn.inc.php, (4) manage.inc.php, (5) mind.inc.php, and (6) sensory.inc.php in include/."
},
{
"lang":"es",
"value":"M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en Mindmeld 1.2.0.10 permiten a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de un URL en el par\u00e1metro MM_GLOBALS[home] de (1) acweb/admin_index.php; y (2) ask.inc.php, (3) learn.inc.php, (4) manage.inc.php, (5) mind.inc.php, y (6) sensory.inc.php en include/."