PHP remote file inclusion vulnerability in cart_content.php in Squirrelcart 2.2.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the cart_isp_root parameter.
References
Link | Resource |
---|---|
http://secunia.com/advisories/20121 | Patch Vendor Advisory |
http://www.ldev.com/forums/showthread.php?p=9976#post9976 | Patch URL Repurposed |
http://www.osvdb.org/25523 | Exploit |
http://www.securityfocus.com/bid/17992 | Exploit |
http://www.vupen.com/english/advisories/2006/1818 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26443 | |
https://www.exploit-db.com/exploits/1790 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2006-05-19 23:02
Updated : 2024-02-14 01:17
NVD link : CVE-2006-2483
Mitre link : CVE-2006-2483
CVE.ORG link : CVE-2006-2483
JSON object : View
Products Affected
lighthouse_development
- squirrelcart
CWE