CVE-2006-4195 – Mambo Component Peoplebook 1.0 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-4195
PHP remote file inclusion vulnerability in param.peoplebook.php in the Peoplebook Component for Mambo (com_peoplebook) 1.0 and earlier, and possibly 1.1.2, when register_globals and allow_url_fopen are enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. Vulnerabilidad de inclusión remota de archivo en PHP en param.peoplebook.php del componente Peoplebook para Mambo (com_peoplebook) 1.0 y anteriores, y posiblemente 1.1.2, cuando register_globals y allow_fopenurl están activados, permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro mosConfig_absolute_path. • https://www.exploit-db.com/exploits/2184 http://secunia.com/advisories/21470 http://securityreason.com/securityalert/1406 http://www.securityfocus.com/archive/1/443201/100/0/threaded http://www.securityfocus.com/bid/19505 http://www.vupen.com/english/advisories/2006/3277 https://exchange.xforce.ibmcloud.com/vulnerabilities/28359 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-4203 – Mambo Component MMP 1.2 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-4203
PHP remote file inclusion vulnerability in help.mmp.php in the MMP Component (com_mmp) 1.2 and earlier for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. Vulnerabilidad de inclusión remota de archivo en PHP en help.mmp.php del componente MMP (com_mmp) 1.2 y anteriores para Mambo permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro mosConfig_absolute_path. • https://www.exploit-db.com/exploits/2182 http://secunia.com/advisories/21479 http://www.securityfocus.com/bid/19502 http://www.vupen.com/english/advisories/2006/3278 https://exchange.xforce.ibmcloud.com/vulnerabilities/28361 •
CVE-2006-3930 – Mambo Component 'com_a6mambohelpdesk' 18RC1 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-3930
PHP remote file inclusion vulnerability in admin.a6mambohelpdesk.php in a6mambohelpdesk Mambo Component 18RC1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_live_site parameter. Vulnerabilidad de inclusión remota de archivo en PHP en admin.a6mambohelpdesk.php de a6mambohelpdesk Mambo Component 18RC1 y versiones anteriores permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro mosConfig_live_site. • https://www.exploit-db.com/exploits/2078 http://secunia.com/advisories/21227 http://securityreason.com/securityalert/1309 http://www.osvdb.org/27654 http://www.securityfocus.com/archive/1/441286/100/0/threaded http://www.securityfocus.com/bid/19198 http://www.vupen.com/english/advisories/2006/3015 https://exchange.xforce.ibmcloud.com/vulnerabilities/28054 •
CVE-2006-3748 – Mambo Component com_loudmouth 4.0j - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-3748
PHP remote file inclusion vulnerability in includes/abbc/abbc.class.php in the LoudMouth Component for Mambo 4.0j, and possibly other versions including 4.1, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. Vulnerabilidad de inclusión remota de archivo en PHP en includes/abbc/abbc.class.php en el componente LoudMouth para Mambo 4.0j, y posiblemente otras versiones incluidas la 4.1, permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro mosConfig_absolute_path. • https://www.exploit-db.com/exploits/2023 http://secunia.com/advisories/21077 http://www.securityfocus.com/bid/19044 http://www.vupen.com/english/advisories/2006/2844 https://exchange.xforce.ibmcloud.com/vulnerabilities/27772 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-3528 – Mambo Component SimpleBoard 1.1.0 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-3528
Multiple PHP remote file inclusion vulnerabilities in Simpleboard Mambo module 1.1.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the sbp parameter to (1) image_upload.php and (2) file_upload.php. Múltiples vulnerabilidades de inclusión de archivo PHP remoto en el módulo Simpleboard de Mambo 1.1.0 y anteriores permite a atacantes remotos ejecutar código PHP de su elección a través de un URL en el parámetro sbp a (1) image_upload.php y (2) file_upload.php. • https://www.exploit-db.com/exploits/1994 http://marc.info/?l=bugtraq&m=115876919804966&w=2 http://secunia.com/advisories/20981 http://securitytracker.com/id?1016824 http://www.osvdb.org/27421 http://www.osvdb.org/28531 http://www.securityfocus.com/archive/1/445716/100/0/threaded http://www.securityfocus.com/bid/18917 http://www.vupen.com/english/advisories/2006/2716 • CWE-94: Improper Control of Generation of Code ('Code Injection') •