php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.
References
Configurations
History
No history.
Information
Published : 2005-09-02 23:03
Updated : 2024-02-04 16:52
NVD link : CVE-2005-2775
Mitre link : CVE-2005-2775
CVE.ORG link : CVE-2005-2775
JSON object : View
Products Affected
phpwebnotes
- phpwebnotes
CWE