CVE-2006-3266

N/A Unknown
Published: June 27, 2006 Modified: April 16, 2026
View on NVD

Description

Multiple PHP remote file inclusion vulnerabilities in Bee-hive Lite 1.2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) header parameter to (a) conad/include/rootGui.inc.php and (b) include/rootGui.inc.php; (2) mysqlCall parameter to (c) conad/changeEmail.inc.php, (d) conad/changeUserDetails.inc.php, (e) conad/checkPasswd.inc.php, (f) conad/login.inc.php and (g) conad/logout.inc.php; (3) mysqlcall parameter to (h) include/listall.inc.php; (4) prefix parameter to (i) show/index.php; and (5) config parameter to (j) conad/include/mysqlCall.inc.php.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/20814
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/26815
Source: cve@mitre.org
http://www.osvdb.org/26816
Source: cve@mitre.org
http://www.osvdb.org/26817
Source: cve@mitre.org
http://www.osvdb.org/26818
Source: cve@mitre.org
http://www.osvdb.org/26819
Source: cve@mitre.org
http://www.osvdb.org/26820
Source: cve@mitre.org
http://www.osvdb.org/26821
Source: cve@mitre.org
http://www.osvdb.org/26822
Source: cve@mitre.org
http://www.osvdb.org/26823
Source: cve@mitre.org
http://www.osvdb.org/26824
Source: cve@mitre.org
http://secunia.com/advisories/20814
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/26815
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26816
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26817
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26818
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26819
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26820
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26821
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26822
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26823
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26824
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/18654
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2516
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27386
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/1951
Source: af854a3a-2127-422b-91ae-364da2661108

30 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
11.7%
94th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

magnet