7.5
CVSSv2

CVE-2006-1747

Published: 12/04/2006 Updated: 14/02/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 785
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

PHP remote file inclusion vulnerability in Virtual War (VWar) 1.5.0 allows remote malicious users to execute arbitrary PHP code via a URL in the vwar_root parameter to (1) admin/admin.php, (2) war.php, (3) stats.php, (4) news.php, (5) joinus.php, (6) challenge.php, (7) calendar.php, (8) member.php, (9) popup.php, and other unspecified scripts in the admin folder. NOTE: these are different attack vectors than CVE-2006-1636 and CVE-2006-1503.

Vulnerable Product Search on Vulmon Subscribe to Product

vwar virtual war 1.5.0

Exploits

source: wwwsecurityfocuscom/bid/19387/info VWar is prone to multiple remote file-include vulnerabilities because the application fails to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process ...
source: wwwsecurityfocuscom/bid/19387/info VWar is prone to multiple remote file-include vulnerabilities because the application fails to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver ...
source: wwwsecurityfocuscom/bid/19387/info VWar is prone to multiple remote file-include vulnerabilities because the application fails to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver pr ...
source: wwwsecurityfocuscom/bid/19387/info VWar is prone to multiple remote file-include vulnerabilities because the application fails to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process Thi ...
source: wwwsecurityfocuscom/bid/19387/info VWar is prone to multiple remote file-include vulnerabilities because the application fails to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process T ...
source: wwwsecurityfocuscom/bid/19387/info VWar is prone to multiple remote file-include vulnerabilities because the application fails to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver proces ...
source: wwwsecurityfocuscom/bid/19387/info VWar is prone to multiple remote file-include vulnerabilities because the application fails to properly sanitize user-supplied input An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver proc ...