CVE-2006-4639

Multiple PHP remote file inclusion vulnerabilities in C-News.fr C-News 1.0.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the path parameter in (1) formulaire_commentaires.php, (2) affichage/liste_news.php, (3) affichage/news_complete.php, or (4) affichage/pagination.php. NOTE: the provenance of some of this information is unknown; some details are obtained from third party information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:c-news.fr:c-news:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () http://secunia.com/advisories/21758 - Vendor Advisory () http://secunia.com/advisories/21758 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/445781/100/0/threaded - () http://www.securityfocus.com/archive/1/445781/100/0/threaded -
References () http://www.vupen.com/english/advisories/2006/3471 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3471 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28766 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28766 -

Information

Published : 2006-09-08 20:04

Updated : 2025-04-03 01:03


NVD link : CVE-2006-4639

Mitre link : CVE-2006-4639

CVE.ORG link : CVE-2006-4639


JSON object : View

Products Affected

c-news.fr

  • c-news
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')