CVE-2006-4719

Multiple PHP remote file inclusion vulnerabilities in MyABraCaDaWeb 1.0.3, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the base parameter to (1) index.php or (2) pop.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:myabracadaweb:myabracadaweb:1.0.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () http://attrition.org/pipermail/vim/2006-September/001027.html - Exploit () http://attrition.org/pipermail/vim/2006-September/001027.html - Exploit
References () http://secunia.com/advisories/21817 - Exploit, Vendor Advisory () http://secunia.com/advisories/21817 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/19944 - () http://www.securityfocus.com/bid/19944 -
References () http://www.vupen.com/english/advisories/2006/3544 - () http://www.vupen.com/english/advisories/2006/3544 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28851 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28851 -
References () https://www.exploit-db.com/exploits/2335 - () https://www.exploit-db.com/exploits/2335 -

Information

Published : 2006-09-12 16:07

Updated : 2024-11-21 00:16


NVD link : CVE-2006-4719

Mitre link : CVE-2006-4719

CVE.ORG link : CVE-2006-4719


JSON object : View

Products Affected

myabracadaweb

  • myabracadaweb