Show plain JSON{"id": "CVE-2006-3340", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 4.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2006-07-03T18:05:00.000", "references": [{"url": "http://secunia.com/advisories/20819", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/27168", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/27169", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/27170", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/27171", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/27172", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/27173", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/27174", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/27175", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/27176", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/27177", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/27178", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/18690", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2006/2561", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/1956", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20819", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/27168", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/27169", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/27170", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/27171", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/27172", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/27173", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/27174", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/27175", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/27176", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/27177", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/27178", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/18690", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2006/2561", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/1956", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Multiple PHP remote file inclusion vulnerabilities in Pearl For Mambo module 1.6 for Mambo, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via the (1) phpbb_root_path parameter in (a) includes/functions_cms.php and the (2) GlobalSettings[templatesDirectory] parameter in multiple files in the \"includes\" directory including (b) adminSensored.php, (c) adminBoards.php, (d) adminAttachments.php, (e) adminAvatars.php, (f) adminBackupdatabase.php, (g) adminBanned.php, (h) adminForums.php, (i) adminPolls.php, (j) adminSmileys.php, (k) poll.php, and (l) move.php."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de inclusi\u00f3n remotos de ficheros PHP en Pearl para el modulo Mambo v1.6 para Mambo, cuando register_globals esta activado, permite a atacantes remotos ejecutar c\u00f3digo PHP de modo arbitrario a trav\u00e9s de (1) el par\u00e1metro \"phpbb_root_path\" en (a) includes/functions_cms.php y (2) el par\u00e1metro \"GlobalSettings[templatesDirectory]\" en m\u00faltiples ficheros en el directorio \"includes\" incluyendo (b) adminSensored.php, (c) adminBoards.php, (d) adminAttachments.php, (e) adminAvatars.php, (f) adminBackupdatabase.php, (g) adminBanned.php, (h) adminForums.php, (i) adminPolls.php, (j) adminSmileys.php, (k) poll.php, y (l) move.php."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:pearlinger:pearl_for_mambo:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6C74BCF-75AF-40D4-8171-3FDA726CF34A"}, {"criteria": "cpe:2.3:a:pearlinger:pearl_for_mambo:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90A00BA2-FE5A-486F-9845-F2DA15CBA5AE"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}