{ "schema_version": "1.4.0", "id": "GHSA-h6jw-653g-hr42", "modified": "2022-05-01T07:05:30Z", "published": "2022-05-01T07:05:30Z", "aliases": [ "CVE-2006-3075" ], "details": "Multiple PHP remote file inclusion vulnerabilities in PictureDis Professional 1.33 Build 234 and earlier and PictureDis Photoalbum 4.82 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the lang parameter to files in photoalbum/ including (1) thumstbl.php, (2) wpfiles.php, and (3) wallpapr.php.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3075" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27183" }, { "type": "WEB", "url": "http://secunia.com/advisories/20656" }, { "type": "WEB", "url": "http://securitytracker.com/id?1016279" }, { "type": "WEB", "url": "http://www.osvdb.org/26500" }, { "type": "WEB", "url": "http://www.osvdb.org/26501" }, { "type": "WEB", "url": "http://www.osvdb.org/26502" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/437449/100/100/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/18471" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/2352" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-06-19T10:02:00Z" } }