"value":"Multiple PHP remote file inclusion vulnerabilities in Madirish Webmail 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[basedir] parameter to (1) calendar.php, (2) compose.php, and (3) index.php, different vectors than CVE-2007-2826. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
},
{
"lang":"es",
"value":"M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en Madirish Webmail 2.0 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante un URL en el par\u00e1metro GLOBALS[basedir] de (1) calendar.php, (2) compose.php, y (3) index.php, vectores diferentes de CVE-2007-2826. NOTA: la procedencia de esta informaci\u00f3n es desconocida; los detalles se han obtenido exclusivamente de informaci\u00f3n de terceros."
"evaluatorSolution":"A solution/patch has been released for these vulnerabilities: \r\n \r\n CVE-2007-2826\r\n CVE-2007-3058 \r\n\r\nhttps://sourceforge.net/projects/madirishwebmail/\r\n\r\nhttps://sourceforge.net/project/shownotes.phpgroup_id=101727&release_id=517013\r\n"