mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
133 lines
4.1 KiB
JSON
133 lines
4.1 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2006-3172",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Multiple PHP remote file inclusion vulnerabilities in Content*Builder 0.7.5 allow remote attackers to execute arbitrary PHP code via a URL with a trailing slash (/) character in the (1) lang_path parameter to (a) cms/plugins/col_man/column.inc.php, (b) cms/plugins/poll/poll.inc.php, (c) cms/plugins/user_managment/usrPortrait.inc.php, (d) cms/plugins/user_managment/user.inc.php, (e) cms/plugins/media_manager/media.inc.php, (f) cms/plugins/events/permanent.eventMonth.inc.php, (g) cms/plugins/events/events.inc.php, and (h) cms/plugins/newsletter2/newsletter.inc.php; (2) path[cb] parameter to (i) modules/guestbook/guestbook.inc.php, (j) modules/shoutbox/shoutBox.php, and (k) modules/sitemap/sitemap.inc.php; and the (3) rel parameter to (l) modules/download/overview.inc.php, (m) modules/download/detailView.inc.php, (n) modules/article/fullarticle.inc.php, (o) modules/article/comments.inc.php, (p) modules/article2/overview.inc.php, (q) modules/article2/fullarticle.inc.php, (r) modules/article2/comments.inc.php, (s) modules/headline/headlineBox.php, and (t) modules/headline/showHeadline.inc.php."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"url" : "http://marc.info/?l=bugtraq&m=115016951316696&w=2"
|
|
},
|
|
{
|
|
"url" : "http://www.securityfocus.com/bid/18404"
|
|
},
|
|
{
|
|
"url" : "http://www.vupen.com/english/advisories/2006/2300"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26344"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26345"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26346"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26347"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26348"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26349"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26350"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26351"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26352"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26353"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26354"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26355"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26356"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26357"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26358"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26359"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26360"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26361"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26362"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/26363"
|
|
},
|
|
{
|
|
"url" : "http://secunia.com/advisories/20557"
|
|
},
|
|
{
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27044"
|
|
}
|
|
]
|
|
}
|
|
}
|