"value":"PHP remote file inclusion vulnerability in admin/includes/spaw/spaw_control.class.php in Download-Engine 1.4.2 allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: CVE analysis suggests that this issue is actually in a third party product, SPAW Editor PHP Edition, so this issue is probably a duplicate of CVE-2006-4656."
},
{
"lang":"es",
"value":"Vulnerabilidad de inclusi\u00f3n remota de archivo en PHP en admin/includes/spaw/spaw_control.class.php en Download-Engine 1.4.2 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante un URL en el par\u00e1metro spaw_root. NOTA: el an\u00e1lisis de CVE sugiere que este problema est\u00e1 realmente en un producto de un tercero, SPAW Editor PHP Edition, as\u00ed que este problema es probablemente un duplicado de CVE-2006-4656."