PHP remote file inclusion vulnerability in misc.php in SH-News 0.93, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the news_cfg[path] parameter.
References
Link | Resource |
---|---|
http://secunia.com/advisories/23524 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/21761 | Exploit |
http://www.vupen.com/english/advisories/2006/5161 | |
https://www.exploit-db.com/exploits/2984 | |
http://secunia.com/advisories/23524 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/21761 | Exploit |
http://www.vupen.com/english/advisories/2006/5161 | |
https://www.exploit-db.com/exploits/2984 |
Configurations
History
21 Nov 2024, 00:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/23524 - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/21761 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/5161 - | |
References | () https://www.exploit-db.com/exploits/2984 - |
Information
Published : 2006-12-28 21:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6801
Mitre link : CVE-2006-6801
CVE.ORG link : CVE-2006-6801
JSON object : View
Products Affected
sh-news
- sh-news
CWE