Multiple PHP remote file inclusion vulnerabilities in Wim Fleischhauer docpile: wim's edition (docpile:we) 0.2.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the INIT_PATH parameter to (1) lib/folder.class.php, (2) lib/email.inc.php, (3) lib/document.class.php or (4) lib/auth.inc.php.
References
Configurations
History
No history.
Information
Published : 2006-08-11 01:04
Updated : 2018-10-17 21:33
NVD link : CVE-2006-4075
Mitre link : CVE-2006-4075
CVE.ORG link : CVE-2006-4075
JSON object : View
Products Affected
wim_fleischhauer
- docpile_we
CWE