PHP remote file inclusion vulnerability in footer.inc.php in PowerClan 1.14a and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the settings[footer] parameter.
References
Configurations
History
21 Nov 2024, 00:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/23450 - | |
References | () http://www.attrition.org/pipermail/vim/2006-December/001194.html - Exploit | |
References | () http://www.securityfocus.com/archive/1/490009/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21707 - | |
References | () http://www.vupen.com/english/advisories/2006/5119 - | |
References | () https://www.exploit-db.com/exploits/2973 - |
Information
Published : 2006-12-23 01:28
Updated : 2024-11-21 00:23
NVD link : CVE-2006-6715
Mitre link : CVE-2006-6715
CVE.ORG link : CVE-2006-6715
JSON object : View
Products Affected
powerscripts
- powerclan
CWE