cvelist/2006/3xxx/CVE-2006-3172.json
2017-10-16 12:31:07 -04:00

133 lines
4.1 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2006-3172",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Multiple PHP remote file inclusion vulnerabilities in Content*Builder 0.7.5 allow remote attackers to execute arbitrary PHP code via a URL with a trailing slash (/) character in the (1) lang_path parameter to (a) cms/plugins/col_man/column.inc.php, (b) cms/plugins/poll/poll.inc.php, (c) cms/plugins/user_managment/usrPortrait.inc.php, (d) cms/plugins/user_managment/user.inc.php, (e) cms/plugins/media_manager/media.inc.php, (f) cms/plugins/events/permanent.eventMonth.inc.php, (g) cms/plugins/events/events.inc.php, and (h) cms/plugins/newsletter2/newsletter.inc.php; (2) path[cb] parameter to (i) modules/guestbook/guestbook.inc.php, (j) modules/shoutbox/shoutBox.php, and (k) modules/sitemap/sitemap.inc.php; and the (3) rel parameter to (l) modules/download/overview.inc.php, (m) modules/download/detailView.inc.php, (n) modules/article/fullarticle.inc.php, (o) modules/article/comments.inc.php, (p) modules/article2/overview.inc.php, (q) modules/article2/fullarticle.inc.php, (r) modules/article2/comments.inc.php, (s) modules/headline/headlineBox.php, and (t) modules/headline/showHeadline.inc.php."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "http://marc.info/?l=bugtraq&m=115016951316696&w=2"
},
{
"url" : "http://www.securityfocus.com/bid/18404"
},
{
"url" : "http://www.vupen.com/english/advisories/2006/2300"
},
{
"url" : "http://www.osvdb.org/26344"
},
{
"url" : "http://www.osvdb.org/26345"
},
{
"url" : "http://www.osvdb.org/26346"
},
{
"url" : "http://www.osvdb.org/26347"
},
{
"url" : "http://www.osvdb.org/26348"
},
{
"url" : "http://www.osvdb.org/26349"
},
{
"url" : "http://www.osvdb.org/26350"
},
{
"url" : "http://www.osvdb.org/26351"
},
{
"url" : "http://www.osvdb.org/26352"
},
{
"url" : "http://www.osvdb.org/26353"
},
{
"url" : "http://www.osvdb.org/26354"
},
{
"url" : "http://www.osvdb.org/26355"
},
{
"url" : "http://www.osvdb.org/26356"
},
{
"url" : "http://www.osvdb.org/26357"
},
{
"url" : "http://www.osvdb.org/26358"
},
{
"url" : "http://www.osvdb.org/26359"
},
{
"url" : "http://www.osvdb.org/26360"
},
{
"url" : "http://www.osvdb.org/26361"
},
{
"url" : "http://www.osvdb.org/26362"
},
{
"url" : "http://www.osvdb.org/26363"
},
{
"url" : "http://secunia.com/advisories/20557"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27044"
}
]
}
}