"value":"Multiple PHP remote file inclusion vulnerabilities in SnippetMaster 2.2.2, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) _SESSION[SCRIPT_PATH] parameter to includes/vars.inc.php and the (2) g_pcltar_lib_dir parameter to includes/tar_lib/pcltar.lib.php."
},
{
"lang":"es",
"value":"M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo PHP en SnippetMaster v2.2.2, cuando register_globals est\u00e1 activado, permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de una URL en los par\u00e1metros (1) _SESSION[SCRIPT_PATH] a includes/vars.inc.php y (2) g_pcltar_lib_dir a includes/tar_lib/pcltar.lib.php."