PHP remote file inclusion vulnerability in index.php in CoolMenus allows remote attackers to execute arbitrary code via a URL in the page parameter. NOTE: the original report for this issue is probably erroneous, since CoolMenus does not appear to be written in PHP.
References
Configurations
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://kurdishsecurity.blogspot.com/2006/04/coolmenus-event-remote-file-include.html - | |
References | () http://securityreason.com/securityalert/823 - | |
References | () http://www.dhtmlcentral.com/projects/coolmenus/ - | |
References | () http://www.securityfocus.com/archive/1/432395/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/432597/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/432630/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17738 - |
Information
Published : 2006-05-01 22:06
Updated : 2025-04-03 01:03
NVD link : CVE-2006-2122
Mitre link : CVE-2006-2122
CVE.ORG link : CVE-2006-2122
JSON object : View
Products Affected
coolmenus
- coolmenus
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')