"value":"Multiple PHP remote file inclusion vulnerabilities in Visual Shapers ezContents 2.0.3 allow remote attackers to execute arbitrary PHP code via an empty GLOBALS[rootdp] parameter and an ftps URL in the (1) GLOBALS[admin_home] parameter in (a) diary/event_list.php, (b) gallery/gallery_summary.php, (c) guestbook/showguestbook.php, (d) links/showlinks.php, and (e) reviews/review_summary.php; and the (2) GLOBALS[language_home] parameter in (f) calendar/calendar.php, (g) news/shownews.php, (h) poll/showpoll.php, (i) search/search.php, (j) toprated/toprated.php, and (k) whatsnew/whatsnew.php."
},
{
"lang":"es",
"value":"M\u00faltiples vulnerabilidades PHP de inclusi\u00f3n remota de archivo en Visual Shapers ezContents 2.0.3 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante un par\u00e1metro GLOBALS[rootdp] vac\u00edo y una URL ftps en el (1) par\u00e1metro GLOBALS[admin_home] en (a) diary/event_list.php, (b) gallery/gallery_summary.php, (c) guestbook/showguestbook.php, (d) links/showlinks.php, y (e) reviews/review_summary.php; y el (2) par\u00e1metro GLOBALS[language_home] en (f) calendar/calendar.php, (g) news/shownews.php, (h) poll/showpoll.php, (i) search/search.php, (j) toprated/toprated.php, y (k) whatsnew/whatsnew.php."