Multiple PHP remote file inclusion vulnerabilities in mg.applanix 1.3.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the apx_root_path parameter to (1) act/act_check_access.php, (2) dsp/dsp_form_booking_ctl.php, and (3) dsp/dsp_bookings.php.
References
Configurations
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/1972 - | |
References | () http://www.attrition.org/pipermail/vim/2006-December/001163.html - | |
References | () http://www.attrition.org/pipermail/vim/2006-December/001164.html - | |
References | () http://www.securityfocus.com/archive/1/452138/100/200/threaded - | |
References | () http://www.securityfocus.com/bid/21147 - Exploit | |
References | () https://www.exploit-db.com/exploits/2794 - |
Information
Published : 2006-12-07 01:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6341
Mitre link : CVE-2006-6341
CVE.ORG link : CVE-2006-6341
JSON object : View
Products Affected
mg.blattl
- mg.applanix
CWE