Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-1767

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-13 Apr, 2006 | 10:00
Updated At-07 Aug, 2024 | 17:27
Rejected At-
Credits

Multiple PHP remote file inclusion vulnerabilities in nicecoder.com INDEXU 5.0.0 and 5.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the theme_path parameter in (1) index.php, (2) become_editor.php, (3) add.php, (4) bad_link.php, (5) browse.php, (6) detail.php, (7) fav.php, (8) get_rated.php, (9) login.php, (10) mailing_list.php, (11) new.php, (12) modify.php, (13) pick.php, (14) power_search.php, (15) rating.php, (16) register.php, (17) review.php, (18) rss.php, (19) search.php, (20) send_pwd.php, (21) sendmail.php, (22) tell_friend.php, (23) top_rated.php, (24) user_detail.php, and (25) user_search.php; and the (26) base_path parameter in invoice.php.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:13 Apr, 2006 | 10:00
Updated At:07 Aug, 2024 | 17:27
Rejected At:
▼CVE Numbering Authority (CNA)

Multiple PHP remote file inclusion vulnerabilities in nicecoder.com INDEXU 5.0.0 and 5.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the theme_path parameter in (1) index.php, (2) become_editor.php, (3) add.php, (4) bad_link.php, (5) browse.php, (6) detail.php, (7) fav.php, (8) get_rated.php, (9) login.php, (10) mailing_list.php, (11) new.php, (12) modify.php, (13) pick.php, (14) power_search.php, (15) rating.php, (16) register.php, (17) review.php, (18) rss.php, (19) search.php, (20) send_pwd.php, (21) sendmail.php, (22) tell_friend.php, (23) top_rated.php, (24) user_detail.php, and (25) user_search.php; and the (26) base_path parameter in invoice.php.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/archive/1/430599/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.osvdb.org/28415
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/28426
vdb-entry
x_refsource_OSVDB
http://www.securityfocus.com/bid/17470
vdb-entry
x_refsource_BID
http://www.osvdb.org/28406
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/28412
vdb-entry
x_refsource_OSVDB
http://securitytracker.com/id?1015891
vdb-entry
x_refsource_SECTRACK
http://www.osvdb.org/28419
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/28410
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/28417
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/28427
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/28422
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/24597
vdb-entry
x_refsource_OSVDB
http://ftp.kep.online.fr/Indexu_5.0.1_File_Inclusion_Exploit-by_King-Hacker_and-Khamaileon.txt
x_refsource_MISC
http://www.osvdb.org/24596
vdb-entry
x_refsource_OSVDB
http://securitytracker.com/id?1016331
vdb-entry
x_refsource_SECTRACK
http://www.osvdb.org/28416
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/28425
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/28413
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/28409
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.securityfocus.com/archive/1/430599/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.osvdb.org/28415
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/28426
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.securityfocus.com/bid/17470
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.osvdb.org/28406
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/28412
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://securitytracker.com/id?1015891
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.osvdb.org/28419
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/28410
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/28417
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/28427
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/28422
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/24597
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://ftp.kep.online.fr/Indexu_5.0.1_File_Inclusion_Exploit-by_King-Hacker_and-Khamaileon.txt
Resource:
x_refsource_MISC
Hyperlink: http://www.osvdb.org/24596
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://securitytracker.com/id?1016331
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.osvdb.org/28416
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/28425
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/28413
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/28409
Resource:
vdb-entry
x_refsource_OSVDB
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/archive/1/430599/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.osvdb.org/28415
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/28426
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.securityfocus.com/bid/17470
vdb-entry
x_refsource_BID
x_transferred
http://www.osvdb.org/28406
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/28412
vdb-entry
x_refsource_OSVDB
x_transferred
http://securitytracker.com/id?1015891
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.osvdb.org/28419
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/28410
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/28417
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/28427
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/28422
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/24597
vdb-entry
x_refsource_OSVDB
x_transferred
http://ftp.kep.online.fr/Indexu_5.0.1_File_Inclusion_Exploit-by_King-Hacker_and-Khamaileon.txt
x_refsource_MISC
x_transferred
http://www.osvdb.org/24596
vdb-entry
x_refsource_OSVDB
x_transferred
http://securitytracker.com/id?1016331
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.osvdb.org/28416
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/28425
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/28413
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/28409
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/430599/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.osvdb.org/28415
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/28426
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.securityfocus.com/bid/17470
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.osvdb.org/28406
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/28412
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://securitytracker.com/id?1015891
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.osvdb.org/28419
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/28410
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/28417
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/28427
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/28422
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/24597
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://ftp.kep.online.fr/Indexu_5.0.1_File_Inclusion_Exploit-by_King-Hacker_and-Khamaileon.txt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.osvdb.org/24596
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://securitytracker.com/id?1016331
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.osvdb.org/28416
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/28425
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/28413
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/28409
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:13 Apr, 2006 | 10:02
Updated At:03 Apr, 2025 | 01:03

Multiple PHP remote file inclusion vulnerabilities in nicecoder.com INDEXU 5.0.0 and 5.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the theme_path parameter in (1) index.php, (2) become_editor.php, (3) add.php, (4) bad_link.php, (5) browse.php, (6) detail.php, (7) fav.php, (8) get_rated.php, (9) login.php, (10) mailing_list.php, (11) new.php, (12) modify.php, (13) pick.php, (14) power_search.php, (15) rating.php, (16) register.php, (17) review.php, (18) rss.php, (19) search.php, (20) send_pwd.php, (21) sendmail.php, (22) tell_friend.php, (23) top_rated.php, (24) user_detail.php, and (25) user_search.php; and the (26) base_path parameter in invoice.php.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

nicecoder
nicecoder
>>indexu>>5.0
cpe:2.3:a:nicecoder:indexu:5.0:*:*:*:*:*:*:*
nicecoder
nicecoder
>>indexu>>5.0.1
cpe:2.3:a:nicecoder:indexu:5.0.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://ftp.kep.online.fr/Indexu_5.0.1_File_Inclusion_Exploit-by_King-Hacker_and-Khamaileon.txtcve@mitre.org
N/A
http://securitytracker.com/id?1015891cve@mitre.org
Exploit
http://securitytracker.com/id?1016331cve@mitre.org
N/A
http://www.osvdb.org/24596cve@mitre.org
N/A
http://www.osvdb.org/24597cve@mitre.org
N/A
http://www.osvdb.org/28406cve@mitre.org
N/A
http://www.osvdb.org/28409cve@mitre.org
N/A
http://www.osvdb.org/28410cve@mitre.org
N/A
http://www.osvdb.org/28412cve@mitre.org
N/A
http://www.osvdb.org/28413cve@mitre.org
N/A
http://www.osvdb.org/28415cve@mitre.org
N/A
http://www.osvdb.org/28416cve@mitre.org
N/A
http://www.osvdb.org/28417cve@mitre.org
N/A
http://www.osvdb.org/28419cve@mitre.org
N/A
http://www.osvdb.org/28422cve@mitre.org
N/A
http://www.osvdb.org/28425cve@mitre.org
N/A
http://www.osvdb.org/28426cve@mitre.org
N/A
http://www.osvdb.org/28427cve@mitre.org
N/A
http://www.securityfocus.com/archive/1/430599/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/17470cve@mitre.org
Exploit
http://ftp.kep.online.fr/Indexu_5.0.1_File_Inclusion_Exploit-by_King-Hacker_and-Khamaileon.txtaf854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1015891af854a3a-2127-422b-91ae-364da2661108
Exploit
http://securitytracker.com/id?1016331af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/24596af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/24597af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28406af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28409af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28410af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28412af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28413af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28415af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28416af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28417af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28419af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28422af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28425af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28426af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28427af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/430599/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/17470af854a3a-2127-422b-91ae-364da2661108
Exploit
Hyperlink: http://ftp.kep.online.fr/Indexu_5.0.1_File_Inclusion_Exploit-by_King-Hacker_and-Khamaileon.txt
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015891
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://securitytracker.com/id?1016331
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/24596
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/24597
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28406
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28409
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28410
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28412
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28413
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28415
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28416
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28417
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28419
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28422
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28425
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28426
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/28427
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/430599/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/17470
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://ftp.kep.online.fr/Indexu_5.0.1_File_Inclusion_Exploit-by_King-Hacker_and-Khamaileon.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015891
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://securitytracker.com/id?1016331
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/24596
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/24597
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28406
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28409
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28410
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28412
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28413
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28415
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28416
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28417
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28419
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28422
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28425
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28426
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28427
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/430599/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/17470
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit

Change History

0
Information is not available yet

Similar CVEs

4Records found

CVE-2009-4624
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.40% / 60.22%
||
7 Day CHG~0.00%
Published-18 Jan, 2010 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQL injection vulnerability in download.php in Nicecoder iDesk allows remote attackers to execute arbitrary SQL commands via the cat_id parameter, a different vector than CVE-2005-3843.

Action-Not Available
Vendor-nicecodern/a
Product-ideskn/a
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2006-7017
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.07% / 86.22%
||
7 Day CHG~0.00%
Published-15 Feb, 2007 | 02:00
Updated-07 Aug, 2024 | 20:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple PHP remote file inclusion vulnerabilities in Indexu 5.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the admin_template_path parameter to admin/ scripts (1) app_change_email.php, (2) app_change_pwd.php, (3) app_mod_rewrite.php, (4) app_page_caching.php, (5) app_setup.php, (6) cat_add.php, (7) cat_delete.php, (8) cat_edit.php, (9) cat_path_update.php, (10) cat_search.php, (11) cat_struc.php, (12) cat_view.php, (13) cat_view_hidden.php, (14) cat_view_hierarchy.php, (15) cat_view_registered_only.php, (16) checkurl_web.php, (17) db_alter.php, (18) db_alter_change.php, (19) db_backup.php, (20) db_export.php, (21) db_import.php, (22) editor_add.php, (23) editor_delete.php, (24) editor_validate.php, (25) head.php, (26) index.php, (27) inv_config.php, (28) inv_config_payment.php, (29) inv_create.php, (30) inv_delete.php, (31) inv_edit.php, (32) inv_markpaid.php, (33) inv_markunpaid.php, (34) inv_overdue.php, (35) inv_paid.php, (36) inv_send.php, (37) inv_unpaid.php, (38) lang_modify.php, (39) link_add.php, (40) link_bad.php, (41) link_bad_delete.php, (42) link_checkurl.php, (43) link_delete.php, (44) link_duplicate.php, (45) link_edit.php, (46) link_premium_listing.php, (47) link_premium_sponsored.php, (48) link_search.php, (49) link_sponsored_listing.php, (50) link_validate.php, (51) link_validate_edit.php, (52) link_view.php, (53) log_search.php, (54) mail_modify.php, (55) menu.php, (56) message_create.php, (57) message_delete.php, (58) message_edit.php, (59) message_send.php, (60) message_subscriber.php, (61) message_view.php, (62) review_validate.php, (63) review_validate_edit.php, (64) summary.php, (65) template_active.php, (66) template_add_custom.php, (67) template_delete.php, (68) template_delete_file.php, (69) template_duplicate.php, (70) template_export.php, (71) template_import.php, (72) template_manager.php, (73) template_modify.php, (74) template_modify_file.php, (75) template_rename.php, (76) user_add.php, (77) user_delete.php, (78) user_edit.php, (79) user_search.php, and (80) whos.php.

Action-Not Available
Vendor-nicecodern/a
Product-indexun/a
CVE-2005-3843
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.82% / 73.38%
||
7 Day CHG~0.00%
Published-26 Nov, 2005 | 22:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQL injection vulnerability in faq.php in Nicecoder iDesk 1.0 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.

Action-Not Available
Vendor-nicecodern/a
Product-ideskn/a
CVE-2006-0688
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-10.30% / 92.88%
||
7 Day CHG~0.00%
Published-15 Feb, 2006 | 11:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP remote file include vulnerability in application.php in nicecoder.com indexu 5.0.0 and 5.0.1 allows remote attackers to execute arbitrary PHP code via a URL in the base_path parameter.

Action-Not Available
Vendor-nicecodern/a
Product-indexun/a
Details not found