{ "schema_version": "1.4.0", "id": "GHSA-63mw-cxcj-9x5w", "modified": "2025-04-03T04:34:03Z", "published": "2022-05-01T07:03:17Z", "aliases": [ "CVE-2006-2860" ], "details": "PHP remote file inclusion vulnerability in Webspotblogging 3.0.1 allows remote attackers to execute arbitrary PHP code via a URL in the path parameter to (1) inc/logincheck.inc.php, (2) inc/adminheader.inc.php, (3) inc/global.php, or (4) inc/mainheader.inc.php. NOTE: some of these vectors were also reported for 3.0 in a separate disclosure.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2860" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26910" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/1871" }, { "type": "WEB", "url": "http://arfis.wordpress.com/2007/09/14/rfi-02-webspotblogging" }, { "type": "WEB", "url": "http://secunia.com/advisories/20439" }, { "type": "WEB", "url": "http://www.osvdb.org/25992" }, { "type": "WEB", "url": "http://www.osvdb.org/25993" }, { "type": "WEB", "url": "http://www.osvdb.org/25994" }, { "type": "WEB", "url": "http://www.osvdb.org/25995" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447001/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/447576/100/200/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/18260" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/2127" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-06-06T20:06:00Z" } }