** DISPUTED ** PHP remote file inclusion vulnerability in modules/bannieres/bannieres.php in Jean-Christophe Ramos SCRIPT BANNIERES (aka ban 0.1 and PLS-Bannieres 1.21) allows remote attackers to execute arbitrary PHP code via a URL in the chemin parameter. NOTE: the issue is disputed by other researchers, who observe that $chemin is defined before use.
References
Configurations
History
21 Nov 2024, 00:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/449910/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/449927/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/449955/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/450297/100/200/threaded - | |
References | () http://www.securityfocus.com/bid/20772 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29856 - |
Information
Published : 2006-11-15 15:07
Updated : 2024-11-21 00:21
NVD link : CVE-2006-5906
Mitre link : CVE-2006-5906
CVE.ORG link : CVE-2006-5906
JSON object : View
Products Affected
jean-christophe_ramos
- pls-bannieres
CWE