CVE-2006-6863

** DISPUTED ** PHP remote file inclusion vulnerability in the Enigma2 plugin (Enigma2.php) in Enigma WordPress Bridge allows remote attackers to execute arbitrary PHP code via a URL in the boarddir parameter. NOTE: CVE disputes this issue, since $boarddir is set to a fixed value.
Configurations

Configuration 1 (hide)

cpe:2.3:a:enigma:wordpress_bridge:*:*:*:*:*:*:*:*

History

17 Jan 2025, 14:15

Type Values Removed Values Added
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 9.8

21 Nov 2024, 00:23

Type Values Removed Values Added
References () http://securityreason.com/securityalert/2093 - () http://securityreason.com/securityalert/2093 -
References () http://securitytracker.com/id?017459 - () http://securitytracker.com/id?017459 -
References () http://www.attrition.org/pipermail/vim/2007-January/001207.html - () http://www.attrition.org/pipermail/vim/2007-January/001207.html -
References () http://www.securityfocus.com/archive/1/455555/100/0/threaded - () http://www.securityfocus.com/archive/1/455555/100/0/threaded -
References () http://www.securityfocus.com/bid/21826 - Exploit () http://www.securityfocus.com/bid/21826 - Exploit
References () https://www.exploit-db.com/exploits/3051 - () https://www.exploit-db.com/exploits/3051 -

Information

Published : 2006-12-31 05:00

Updated : 2025-01-17 14:15


NVD link : CVE-2006-6863

Mitre link : CVE-2006-6863

CVE.ORG link : CVE-2006-6863


JSON object : View

Products Affected

enigma

  • wordpress_bridge