CVE-2006-4877

Variable overwrite vulnerability in David Bennett PHP-Post (PHPp) 1.0 and earlier allows remote attackers to overwrite arbitrary program variables via multiple vectors that use the extract function, as demonstrated by the table_prefix parameter in (1) index.php, (2) profile.php, and (3) header.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:david_bennett:php-post:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () http://secunia.com/advisories/22014 - () http://secunia.com/advisories/22014 -
References () http://securityreason.com/securityalert/1607 - () http://securityreason.com/securityalert/1607 -
References () http://www.osvdb.org/28965 - () http://www.osvdb.org/28965 -
References () http://www.osvdb.org/28966 - () http://www.osvdb.org/28966 -
References () http://www.osvdb.org/28967 - () http://www.osvdb.org/28967 -
References () http://www.securityfocus.com/archive/1/446318/100/0/threaded - () http://www.securityfocus.com/archive/1/446318/100/0/threaded -
References () http://www.securityfocus.com/bid/20061 - () http://www.securityfocus.com/bid/20061 -
References () http://www.vupen.com/english/advisories/2006/3688 - () http://www.vupen.com/english/advisories/2006/3688 -

Information

Published : 2006-09-19 21:07

Updated : 2025-04-03 01:03


NVD link : CVE-2006-4877

Mitre link : CVE-2006-4877

CVE.ORG link : CVE-2006-4877


JSON object : View

Products Affected

david_bennett

  • php-post