{ "schema_version": "1.4.0", "id": "GHSA-xvj5-gjgh-q624", "modified": "2022-05-01T07:07:57Z", "published": "2022-05-01T07:07:57Z", "aliases": [ "CVE-2006-3323" ], "details": "PHP remote file inclusion vulnerability in admin/admin.php in MF Piadas 1.0 allows remote attackers to execute arbitrary PHP code via the page parameter. NOTE: the same vector can be used for cross-site scripting, but CVE analysis suggests that this is resultant from file inclusion of HTML or script.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3323" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27412" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27415" }, { "type": "WEB", "url": "http://kurdishsecurity.blogspot.com/2006/06/kurdish-security-10-mf-piadas-10.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/20847" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/1172" }, { "type": "WEB", "url": "http://www.osvdb.org/26867" }, { "type": "WEB", "url": "http://www.osvdb.org/26868" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/438496/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/18676" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/18679" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/2567" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-06-30T23:05:00Z" } }