CVE-2006-4076

Multiple PHP remote file inclusion vulnerabilities in Wim Fleischhauer docpile: wim's edition (docpile:we) 0.2.2 allow remote attackers to execute arbitrary PHP code via a URL in the INIT_PATH parameter to (1) lib/access.inc.php, (2) lib/folders.inc.php, (3) lib/init.inc.php or (4) lib/templates.inc.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wim_fleischhauer:docpile_we:0.2.2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://secunia.com/advisories/21412 - Vendor Advisory () http://secunia.com/advisories/21412 - Vendor Advisory
References () http://www.osvdb.org/27863 - () http://www.osvdb.org/27863 -
References () http://www.osvdb.org/27864 - () http://www.osvdb.org/27864 -
References () http://www.osvdb.org/27865 - () http://www.osvdb.org/27865 -
References () http://www.osvdb.org/27866 - () http://www.osvdb.org/27866 -
References () http://www.vupen.com/english/advisories/2006/3222 - () http://www.vupen.com/english/advisories/2006/3222 -

Information

Published : 2006-08-11 01:04

Updated : 2024-11-21 00:15


NVD link : CVE-2006-4076

Mitre link : CVE-2006-4076

CVE.ORG link : CVE-2006-4076


JSON object : View

Products Affected

wim_fleischhauer

  • docpile_we