PHP File Inclusion Vulnerability in phpWebNotes 2.0.0 via extract() Function
CVE-2005-2775 · HIGH Severity
AV:N/AC:L/AU:N/C:P/I:P/A:P
php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.
Learn more about our Web App Pen Testing.