index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.
References
Configurations
History
No history.
Information
Published : 2006-12-01 01:28
Updated : 2024-02-04 17:13
NVD link : CVE-2006-6213
Mitre link : CVE-2006-6213
CVE.ORG link : CVE-2006-6213
JSON object : View
Products Affected
pegames
- pegames
CWE