PHP remote file inclusion vulnerability in smarty_config.php in Socketwiz Bookmarks 2.0 and earlier allows remote attackers to execute arbitrary PHP code via the root_dir parameter.
References
| Link | Resource |
|---|---|
| http://secunia.com/advisories/21857 | Exploit Vendor Advisory |
| http://www.securityfocus.com/bid/19935 | Exploit Vendor Advisory |
| http://www.vupen.com/english/advisories/2006/3550 | |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/28850 | |
| https://www.exploit-db.com/exploits/2336 | |
| http://secunia.com/advisories/21857 | Exploit Vendor Advisory |
| http://www.securityfocus.com/bid/19935 | Exploit Vendor Advisory |
| http://www.vupen.com/english/advisories/2006/3550 | |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/28850 | |
| https://www.exploit-db.com/exploits/2336 |
Configurations
History
No history.
Information
Published : 2007-03-02 21:18
Updated : 2025-04-09 00:30
NVD link : CVE-2006-7069
Mitre link : CVE-2006-7069
CVE.ORG link : CVE-2006-7069
JSON object : View
Products Affected
socketwiz
- bookmarks
CWE
