Логотип exploitDog
bind:CVE-2006-6213
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-6213

Количество 2

Количество 2

nvd логотип

CVE-2006-6213

около 19 лет назад

index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-557r-mpfm-f4j6

почти 4 года назад

index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2006-6213

index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.

CVSS2: 7.5
4%
Низкий
около 19 лет назад
github логотип
GHSA-557r-mpfm-f4j6

index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.

4%
Низкий
почти 4 года назад

Уязвимостей на страницу