** DISPUTED ** PHP remote file inclusion vulnerability in the Enigma2 plugin (Enigma2.php) in Enigma WordPress Bridge allows remote attackers to execute arbitrary PHP code via a URL in the boarddir parameter. NOTE: CVE disputes this issue, since $boarddir is set to a fixed value.
References
Configurations
History
17 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
21 Nov 2024, 00:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/2093 - | |
References | () http://securitytracker.com/id?017459 - | |
References | () http://www.attrition.org/pipermail/vim/2007-January/001207.html - | |
References | () http://www.securityfocus.com/archive/1/455555/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21826 - Exploit | |
References | () https://www.exploit-db.com/exploits/3051 - |
Information
Published : 2006-12-31 05:00
Updated : 2025-01-17 14:15
NVD link : CVE-2006-6863
Mitre link : CVE-2006-6863
CVE.ORG link : CVE-2006-6863
JSON object : View
Products Affected
enigma
- wordpress_bridge
CWE