{ "schema_version": "1.4.0", "id": "GHSA-w2rp-298m-8m2f", "modified": "2022-05-14T02:41:54Z", "published": "2022-05-14T02:41:54Z", "aliases": [ "CVE-2010-5038" ], "details": "PHP remote file inclusion vulnerability in contact/contact.php in Groone's Simple Contact Form allows remote attackers to execute arbitrary PHP code via a URL in the abspath parameter.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-5038" }, { "type": "WEB", "url": "http://packetstormsecurity.org/1005-exploits/groonescf-rfi.txt" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/8523" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/511551/100/0/threaded" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/1291" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-11-02T21:55:00Z" } }