CVE-2006-1746
Published Apr 12, 2006
Last updated 7 years ago
Overview
- Description
- Directory traversal vulnerability in PHPList 2.10.2 and earlier allows remote attackers to include arbitrary local files via the (1) GLOBALS[database_module] or (2) GLOBALS[language_module] parameters, which overwrite the underlying $GLOBALS variable.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tincan:phplist:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "757EFD41-2C9F-4554-9F91-48D0038D2A75", "versionEndIncluding": "2.10.2" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBE10CFB-A604-4C6E-ACE6-FD441C47D296" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "784C97D4-740E-4C65-98ED-FA03EC3EFAA8" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F94101A7-419E-4ACF-AB75-F0B0DA6E7021" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6F52B3C-7925-4970-AA84-732B34DD2FF0" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5140DBAC-6AF0-41D0-972C-4F97BA06F488" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC2A6FB5-0CE1-4952-9763-7AA0E605A7C9" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "665AC8D2-D3E6-470C-800B-0FD5AACE77BB" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA2FFBB2-E4C0-4F16-90D6-9D3FB2105C35" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15C06CBF-3F4B-4D10-9FF4-21985354ED3A" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.8.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "018BA2DC-D1F7-4995-9D72-C38A2B087F8D" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.8.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "516EB08E-F724-4638-8174-1FB527CE8E5F" }, { "criteria": "cpe:2.3:a:tincan:phplist:2.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BAFF48D-67A7-40DA-9762-DB416E1442C1" } ], "operator": "OR" } ] } ]