mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
162 lines
5.5 KiB
JSON
162 lines
5.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-6740",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple PHP remote file inclusion vulnerabilities in phpProfiles 3.1.2b and earlier allow remote attackers to execute arbitrary PHP code via a URL in the menu parameter to (1) include/body.inc.php or (2) include/body_admin.inc.php; or a URL in the incpath parameter to (3) index.inc.php, (4) account.inc.php, (5) admin_newcomm.inc.php, (6) header_admin.inc.php, (7) header.inc.php, (8) friends.inc.php, (9) menu_u.inc.php, (10) notify.inc.php, (11) body.inc.php, (12) body_admin.inc.php, (13) commrecc.inc.php, (14) do_reg.inc.php, (15) comm_post.inc.php, or (16) menu_v.inc.php in include/, different vectors than CVE-2006-5634. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://linuxwebshop.com/forum/viewtopic.php?t=40",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://linuxwebshop.com/forum/viewtopic.php?t=40"
|
|
},
|
|
{
|
|
"name": "32375",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32375"
|
|
},
|
|
{
|
|
"name": "32363",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32363"
|
|
},
|
|
{
|
|
"name": "32372",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32372"
|
|
},
|
|
{
|
|
"name": "32374",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32374"
|
|
},
|
|
{
|
|
"name": "ADV-2006-5087",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/5087"
|
|
},
|
|
{
|
|
"name": "32376",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32376"
|
|
},
|
|
{
|
|
"name": "32365",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32365"
|
|
},
|
|
{
|
|
"name": "32370",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32370"
|
|
},
|
|
{
|
|
"name": "32366",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32366"
|
|
},
|
|
{
|
|
"name": "32368",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32368"
|
|
},
|
|
{
|
|
"name": "23423",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/23423"
|
|
},
|
|
{
|
|
"name": "32369",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32369"
|
|
},
|
|
{
|
|
"name": "32364",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32364"
|
|
},
|
|
{
|
|
"name": "32371",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32371"
|
|
},
|
|
{
|
|
"name": "20070301 phpProfiles vendor ack",
|
|
"refsource": "VIM",
|
|
"url": "http://www.attrition.org/pipermail/vim/2007-March/001401.html"
|
|
},
|
|
{
|
|
"name": "32367",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32367"
|
|
},
|
|
{
|
|
"name": "phpprofiles-multiple-parameters-file-include(30997)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30997"
|
|
},
|
|
{
|
|
"name": "21667",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/21667"
|
|
},
|
|
{
|
|
"name": "32373",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/32373"
|
|
},
|
|
{
|
|
"name": "2956",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "https://www.exploit-db.com/exploits/2956"
|
|
}
|
|
]
|
|
}
|
|
} |