Multiple PHP remote file inclusion vulnerabilities in Bee-hive Lite 1.2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) header parameter to (a) conad/include/rootGui.inc.php and (b) include/rootGui.inc.php; (2) mysqlCall parameter to (c) conad/changeEmail.inc.php, (d) conad/changeUserDetails.inc.php, (e) conad/checkPasswd.inc.php, (f) conad/login.inc.php and (g) conad/logout.inc.php; (3) mysqlcall parameter to (h) include/listall.inc.php; (4) prefix parameter to (i) show/index.php; and (5) config parameter to (j) conad/include/mysqlCall.inc.php.
References
Configurations
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20814 - Vendor Advisory | |
References | () http://www.osvdb.org/26815 - | |
References | () http://www.osvdb.org/26816 - | |
References | () http://www.osvdb.org/26817 - | |
References | () http://www.osvdb.org/26818 - | |
References | () http://www.osvdb.org/26819 - | |
References | () http://www.osvdb.org/26820 - | |
References | () http://www.osvdb.org/26821 - | |
References | () http://www.osvdb.org/26822 - | |
References | () http://www.osvdb.org/26823 - | |
References | () http://www.osvdb.org/26824 - | |
References | () http://www.securityfocus.com/bid/18654 - | |
References | () http://www.vupen.com/english/advisories/2006/2516 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27386 - | |
References | () https://www.exploit-db.com/exploits/1951 - |
Information
Published : 2006-06-27 21:05
Updated : 2025-04-03 01:03
NVD link : CVE-2006-3266
Mitre link : CVE-2006-3266
CVE.ORG link : CVE-2006-3266
JSON object : View
Products Affected
magnet
- bee-hive_lite
CWE