{ "schema_version": "1.4.0", "id": "GHSA-7w39-38pw-xgpf", "modified": "2022-05-01T18:21:05Z", "published": "2022-05-01T18:21:05Z", "aliases": [ "CVE-2007-4169" ], "details": "** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in vgallite allow remote attackers to execute arbitrary PHP code via a URL in the (1) dirpath parameter to _functions.php or the (2) lang parameter to index.php. NOTE: CVE disputes vector 1 because the applicable include_once is located in a function that is not called on a direct request, and because $dirpath is an argument to this function. CVE disputes vector 2 because \"lang\" is a constant string within an include_once, not a variable. The researcher is also unreliable.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4169" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35819" }, { "type": "WEB", "url": "http://osvdb.org/46803" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/2963" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/475643/100/0/threaded" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-08-07T10:17:00Z" } }