"value":"Multiple PHP remote file inclusion vulnerabilities in the MojoBlog component RC 0.15 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) wp-comments-post.php and (2) wp-trackback.php."
},
{
"lang":"es",
"value":"M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo PHP en el componente MojoBlog RC v0.15 para Joomla!, permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de una URL en el par\u00e1metro mosConfig_absolute_path a (1) wp-comments-post.php y (2) wp-trackback.php."
"evaluatorImpact":"Per http://extensions.joomla.org/extensions/3374/details:\r\n\r\nEditor's note\r\n\r\nThis extension has been unpublished for the following reason:\r\n\r\n * This extension is not compatible with Joomla! 1.5"