CVE-2006-0723

PHP remote file inclusion vulnerability in preview.php in Reamday Enterprises Magic News Lite 1.2.3, when register_globals is enabled, allows remote attackers to include arbitrary files via a URL in the php_script_path parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:reamday_enterprises:magic_news_lite:1.2.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://evuln.com/vulns/72/summary.html - Vendor Advisory () http://evuln.com/vulns/72/summary.html - Vendor Advisory
References () http://secunia.com/advisories/18878 - Vendor Advisory () http://secunia.com/advisories/18878 - Vendor Advisory
References () http://www.securityfocus.com/bid/16660 - () http://www.securityfocus.com/bid/16660 -
References () http://www.securityfocus.com/bid/16665 - () http://www.securityfocus.com/bid/16665 -
References () http://www.vupen.com/english/advisories/2006/0603 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0603 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24608 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24608 -

Information

Published : 2006-02-16 11:02

Updated : 2024-11-21 00:07


NVD link : CVE-2006-0723

Mitre link : CVE-2006-0723

CVE.ORG link : CVE-2006-0723


JSON object : View

Products Affected

reamday_enterprises

  • magic_news_lite
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')