AI Score
Confidence
High
EPSS
Percentile
94.1%
PHP remote file inclusion vulnerability in design/thinkedit/render.php in ThinkEdit 1.9.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the template_file parameter.
secunia.com/advisories/23279
securitytracker.com/id?1017359
svn.berlios.de/viewcvs/thinkedit/trunk/design/thinkedit/render.php?rev=321&r1=230&r2=321
www.vupen.com/english/advisories/2006/4906
exchange.xforce.ibmcloud.com/vulnerabilities/30772
www.exploit-db.com/exploits/2898