Eval injection vulnerability in the decode function in rpc_decoder.php for phpRPC 0.7 and earlier, as used by runcms, exoops, and possibly other programs, allows remote attackers to execute arbitrary PHP code via the base64 tag.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/19028 - | |
References | () http://secunia.com/advisories/19058 - | |
References | () http://securityreason.com/securityalert/502 - | |
References | () http://securitytracker.com/id?1015691 - | |
References | () http://www.gulftech.org/?node=research&article_id=00105-02262006 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/426193 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/16833 - | |
References | () http://www.vupen.com/english/advisories/2006/0745 - |
Information
Published : 2006-03-07 11:02
Updated : 2025-04-03 01:03
NVD link : CVE-2006-1032
Mitre link : CVE-2006-1032
CVE.ORG link : CVE-2006-1032
JSON object : View
Products Affected
phprpc
- phprpc
CWE