{ "schema_version": "1.4.0", "id": "GHSA-xc8j-2crr-pqj3", "modified": "2022-05-17T05:51:28Z", "published": "2022-05-17T05:51:28Z", "aliases": [ "CVE-2010-1934" ], "details": "Multiple PHP remote file inclusion vulnerabilities in openMairie openPlanning 1.00, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the path_om parameter to (1) categorie.class.php, (2) profil.class.php, (3) collectivite.class.php, (4) ressource.class.php, (5) droit.class.php, (6) utilisateur.class.php, and (7) planning.class.php in obj/.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1934" }, { "type": "WEB", "url": "http://packetstormsecurity.org/1004-exploits/openplanning-rfilfi.txt" }, { "type": "WEB", "url": "http://secunia.com/advisories/39606" }, { "type": "WEB", "url": "http://www.exploit-db.com/exploits/12365" }, { "type": "WEB", "url": "http://www.osvdb.org/64186" }, { "type": "WEB", "url": "http://www.osvdb.org/64187" }, { "type": "WEB", "url": "http://www.osvdb.org/64188" }, { "type": "WEB", "url": "http://www.osvdb.org/64189" }, { "type": "WEB", "url": "http://www.osvdb.org/64191" }, { "type": "WEB", "url": "http://www.osvdb.org/64192" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-05-12T16:07:00Z" } }