CVE-2006-0075

Direct static code injection vulnerability in phpBook 1.3.2 and earlier allows remote attackers to execute arbitrary PHP code via the e-mail field (mail variable) in a new message, which is written to a PHP file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:phpbook:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:phpbook:1.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:phpbook:1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:phpbook:1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:phpbook:1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:05

Type Values Removed Values Added
References () http://evuln.com/vulns/6/summary.html - Patch () http://evuln.com/vulns/6/summary.html - Patch
References () http://secunia.com/advisories/18268 - Vendor Advisory () http://secunia.com/advisories/18268 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/420698/100/0/threaded - () http://www.securityfocus.com/archive/1/420698/100/0/threaded -
References () http://www.securityfocus.com/bid/16106 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/16106 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/0002 - () http://www.vupen.com/english/advisories/2006/0002 -

Information

Published : 2006-01-04 01:03

Updated : 2025-04-03 01:03


NVD link : CVE-2006-0075

Mitre link : CVE-2006-0075

CVE.ORG link : CVE-2006-0075


JSON object : View

Products Affected

gnu

  • phpbook