CVE-2006-3980 – Mambo Component MGM 0.95r2 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-3980
PHP remote file inclusion vulnerability in administrator/components/com_mgm/help.mgm.php in Mambo Gallery Manager (MGM) 0.95r2 and earlier for Mambo 4.5 allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. Vulnerabilidad PHP de inclusión remota de archivo en administrator/components/com_mgm/help.mgm.php en Mambo Gallery Manager (MGM) 0.95r2 y anteriores para Mambo 4.5 permite a atacantes remotos ejecutar código PHP de su eleccción a través de una URL en el parámetro mosConfig_absolute_path. • https://www.exploit-db.com/exploits/2084 http://secunia.com/advisories/21268 http://securityreason.com/securityalert/1322 http://www.osvdb.org/27650 http://www.securityfocus.com/archive/1/441533/100/0/threaded http://www.securityfocus.com/bid/19224 http://www.vupen.com/english/advisories/2006/3054 https://exchange.xforce.ibmcloud.com/vulnerabilities/28072 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-3981
https://notcve.org/view.php?id=CVE-2006-3981
PHP remote file inclusion vulnerability in about.mgm.php in Mambo Gallery Manager (MGM) 0.95r2 and earlier for Mambo 4.5 allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: the provenance of this information is unknown; the details are obtained from third party information. Vulnerabilidad PHP de inclusión remota de archivo en about.mgm.php en Mambo Gallery Manager (MGM) 0.95r2 y anteriores para Mambo 4.5 permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro mosConfig_absolute_path. NOTA: la procedencia de esta información es desconocida; los detalles han sido obtenidos a partir de la información de terceros. • http://www.vupen.com/english/advisories/2006/3054 https://exchange.xforce.ibmcloud.com/vulnerabilities/28072 •
CVE-2006-3962 – Joomla! Component com_bayesiannaivefilter 1.1 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-3962
PHP remote file inclusion vulnerability in administrator/components/com_bayesiannaivefilter/lang.php in the bayesiannaivefilter component (com_bayesiannaivefilter) 1.1 for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. Vulnerabilidad PHP de inclusión remota de archivo en administrator/components/com_bayesiannaivefilter/lang.php en el componente bayesiannaivefilter (com_bayesiannaivefilter) 1.1 para Mambo permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro mosConfig_absolute_path. • https://www.exploit-db.com/exploits/2090 http://www.securityfocus.com/bid/19231 •
CVE-2006-3949 – Joomla! Component Artlinks 1.0b4 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-3949
PHP remote file inclusion vulnerability in artlinks.dispnew.php in the Artlinks component (com_artlinks) for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. Vulnerabilidad PHP de inclusión remota de archivo en artlinks.dispnew.php en el componente Artlinks (com_artlinks) para Mambo permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro mosConfig_absolute_path. • https://www.exploit-db.com/exploits/2209 http://securityreason.com/securityalert/1318 http://www.securityfocus.com/archive/1/441541/100/0/threaded http://www.securityfocus.com/bid/19223 https://exchange.xforce.ibmcloud.com/vulnerabilities/28075 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-3947 – Mambo Component mambatStaff 3.1b - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-3947
PHP remote file inclusion vulnerability in components/com_mambatstaff/mambatstaff.php in the Mambatstaff 3.1b and earlier component for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. Vulnerabilidad PHP de inclusión remota de archivo en components/com_mambatstaff/mambatstaff.php en el componente Mambatstaff 3.1b y anteriores para Mambo permite a atacantes remotos ejecutar código PHP a través de una URL en el parámetro mosConfig_absolute_path. • https://www.exploit-db.com/exploits/2086 http://secunia.com/advisories/21292 http://securityreason.com/securityalert/1313 http://www.osvdb.org/27653 http://www.securityfocus.com/archive/1/441538/100/0/threaded http://www.securityfocus.com/bid/19222 http://www.vupen.com/english/advisories/2006/3055 https://exchange.xforce.ibmcloud.com/vulnerabilities/28074 • CWE-94: Improper Control of Generation of Code ('Code Injection') •