This indicates an atttempt to exploit a static code injection vulnerability in Blog Pixel Motion 2.1.1.
A static code injection vulnerability in config.php, in Blog Pixel Motion 2.1.1, allows remote attackers to execute arbitrary PHP code via the "nom_blog" parameter, which is injected into include/variables.php.
Pixel Motion 2.1.1
System compromise: remote code execution.
Currently we are not aware of any vendor supplied patches for this issue.
|IPS (Regular DB)|
|IPS (Extended DB)|