PHP remote file inclusion vulnerability in FtrainSoft Fast Click 2.3.8 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the path parameter to (1) show.php or (2) top.php.
References
Configurations
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/19923 - Vendor Advisory | |
References | () http://securitytracker.com/id?1016021 - | |
References | () http://www.aria-security.net/advisory/fc/fastclick.txt - Exploit | |
References | () http://www.osvdb.org/25192 - | |
References | () http://www.osvdb.org/25289 - | |
References | () http://www.securityfocus.com/archive/1/432963/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17813 - | |
References | () http://www.vupen.com/english/advisories/2006/1631 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26235 - | |
References | () https://www.exploit-db.com/exploits/1740 - |
Information
Published : 2006-05-04 12:38
Updated : 2025-04-03 01:03
NVD link : CVE-2006-2175
Mitre link : CVE-2006-2175
CVE.ORG link : CVE-2006-2175
JSON object : View
Products Affected
ftrainsoft
- fast_click
CWE