CVE-2006-3988 – newsReporter 1.1 - 'index.php' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-3988
PHP remote file inclusion vulnerability in index.php in Knusperleicht newsReporter 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the news_include_path parameter. Vulnerabilidad PHP de inclusión remota de archivo en index.php en Knusperleicht newsReporter 1.1 y anteriores permiten a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro news_include_path. • https://www.exploit-db.com/exploits/2101 http://secunia.com/advisories/21312 http://securityreason.com/securityalert/1326 http://www.securityfocus.com/archive/1/441808/100/0/threaded http://www.securityfocus.com/bid/19275 http://www.vupen.com/english/advisories/2006/3092 https://exchange.xforce.ibmcloud.com/vulnerabilities/28095 •
CVE-2006-3989 – k_shoutbox 4.4 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-3989
PHP remote file inclusion vulnerability in index.php in Knusperleicht Shoutbox 4.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the sb_include_path parameter. Vulnerabilidad PHP de inclusión remota de archivo en index.php en Knusperleicht Shoutbox 4.4 y anteriores permiten a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro sb_include_path. • https://www.exploit-db.com/exploits/2103 http://secunia.com/advisories/21302 http://securityreason.com/securityalert/1325 http://www.osvdb.org/27709 http://www.securityfocus.com/archive/1/441815/100/0/threaded http://www.securityfocus.com/bid/19273 http://www.vupen.com/english/advisories/2006/3090 https://exchange.xforce.ibmcloud.com/vulnerabilities/28123 •
CVE-2006-3982 – Knusperleicht Quickie - 'Quick_Path' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-3982
PHP remote file inclusion vulnerability in quickie.php in Knusperleicht Quickie, probably 0.2, allows remote attackers to execute arbitrary PHP code via a URL in the QUICK_PATH parameter. Vulnerabilidad PHP de inclusión remota de archivo en quickie.php en Knusperleicht Quickie, probablemente 0.2, permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro QUICK_PATH. • https://www.exploit-db.com/exploits/28318 http://securityreason.com/securityalert/1321 http://www.securityfocus.com/archive/1/441814/100/0/threaded http://www.securityfocus.com/bid/19271 https://exchange.xforce.ibmcloud.com/vulnerabilities/28125 •
CVE-2005-1220
https://notcve.org/view.php?id=CVE-2005-1220
Shoutbox SCRIPT 3.0.2 and earlier allows remote attackers to obtain sensitive information via a direct request to db/settings.dat, which displays usernames and password hashes. • http://marc.info/?l=bugtraq&m=111402253108991&w=2 http://secunia.com/advisories/15015 http://www.osvdb.org/15695 https://exchange.xforce.ibmcloud.com/vulnerabilities/20177 •