CVE-2006-6213

PEGames - RCE

Title source: llm
STIX 2.1

Description

index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.

Exploits (1)

exploitdb WORKING POC VERIFIED
by DeltahackingTEAM · textwebappsphp
https://www.exploit-db.com/exploits/2840

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/30517
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/2840
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/21266

Scores

EPSS 0.0338
EPSS Percentile 87.4%

Details

Status published
Products (1)
pegames/pegames
Published Dec 01, 2006
Tracked Since Feb 18, 2026