Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-2686

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-31 May, 2006 | 10:00
Updated At-07 Aug, 2024 | 17:58
Rejected At-
Credits

PHP remote file inclusion vulnerabilities in ActionApps 2.8.1 allow remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[AA_INC_PATH] parameter in (1) cached.php3, (2) cron.php3, (3) discussion.php3, (4) filldisc.php3, (5) filler.php3, (6) fillform.php3, (7) go.php3, (8) hiercons.php3, (9) jsview.php3, (10) live_checkbox.php3, (11) offline.php3, (12) post2shtml.php3, (13) search.php3, (14) slice.php3, (15) sql_update.php3, (16) view.php3, (17) multiple files in the (18) admin/ folder, (19) includes folder, and (20) modules/ folder.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:31 May, 2006 | 10:00
Updated At:07 Aug, 2024 | 17:58
Rejected At:
▼CVE Numbering Authority (CNA)

PHP remote file inclusion vulnerabilities in ActionApps 2.8.1 allow remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[AA_INC_PATH] parameter in (1) cached.php3, (2) cron.php3, (3) discussion.php3, (4) filldisc.php3, (5) filler.php3, (6) fillform.php3, (7) go.php3, (8) hiercons.php3, (9) jsview.php3, (10) live_checkbox.php3, (11) offline.php3, (12) post2shtml.php3, (13) search.php3, (14) slice.php3, (15) sql_update.php3, (16) view.php3, (17) multiple files in the (18) admin/ folder, (19) includes folder, and (20) modules/ folder.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.osvdb.org/27308
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27289
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27304
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27269
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27256
vdb-entry
x_refsource_OSVDB
https://www.exploit-db.com/exploits/1829
exploit
x_refsource_EXPLOIT-DB
http://www.osvdb.org/27275
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27270
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27292
vdb-entry
x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/26776
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2006/1997
vdb-entry
x_refsource_VUPEN
http://www.osvdb.org/27305
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27272
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27278
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27294
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27273
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27287
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27274
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27284
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27253
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27276
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27306
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27263
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27298
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27295
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27271
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27288
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27310
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27264
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27262
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27257
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27259
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27280
vdb-entry
x_refsource_OSVDB
http://secunia.com/advisories/20299
third-party-advisory
x_refsource_SECUNIA
http://www.osvdb.org/27309
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27291
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27267
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27281
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27282
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27301
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27254
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27268
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27258
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27299
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27300
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27297
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27285
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27286
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27296
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27303
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27279
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27277
vdb-entry
x_refsource_OSVDB
http://www.securityfocus.com/bid/19133
vdb-entry
x_refsource_BID
http://www.osvdb.org/27283
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27261
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27302
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27260
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27266
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27290
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27293
vdb-entry
x_refsource_OSVDB
http://www.osvdb.org/27265
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27308
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27289
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27304
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27269
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27256
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: https://www.exploit-db.com/exploits/1829
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://www.osvdb.org/27275
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27270
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27292
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/26776
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2006/1997
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.osvdb.org/27305
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27272
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27278
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27294
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27273
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27287
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27274
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27284
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27253
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27276
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27306
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27263
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27298
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27295
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27271
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27288
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27310
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27264
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27262
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27257
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27259
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27280
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://secunia.com/advisories/20299
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.osvdb.org/27309
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27291
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27267
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27281
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27282
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27301
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27254
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27268
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27258
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27299
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27300
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27297
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27285
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27286
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27296
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27303
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27279
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27277
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.securityfocus.com/bid/19133
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.osvdb.org/27283
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27261
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27302
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27260
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27266
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27290
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27293
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.osvdb.org/27265
Resource:
vdb-entry
x_refsource_OSVDB
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.osvdb.org/27308
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27289
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27304
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27269
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27256
vdb-entry
x_refsource_OSVDB
x_transferred
https://www.exploit-db.com/exploits/1829
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://www.osvdb.org/27275
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27270
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27292
vdb-entry
x_refsource_OSVDB
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/26776
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2006/1997
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.osvdb.org/27305
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27272
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27278
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27294
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27273
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27287
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27274
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27284
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27253
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27276
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27306
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27263
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27298
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27295
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27271
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27288
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27310
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27264
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27262
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27257
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27259
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27280
vdb-entry
x_refsource_OSVDB
x_transferred
http://secunia.com/advisories/20299
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.osvdb.org/27309
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27291
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27267
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27281
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27282
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27301
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27254
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27268
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27258
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27299
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27300
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27297
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27285
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27286
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27296
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27303
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27279
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27277
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.securityfocus.com/bid/19133
vdb-entry
x_refsource_BID
x_transferred
http://www.osvdb.org/27283
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27261
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27302
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27260
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27266
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27290
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27293
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.osvdb.org/27265
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27308
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27289
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27304
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27269
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27256
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/1829
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://www.osvdb.org/27275
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27270
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27292
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/26776
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/1997
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.osvdb.org/27305
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27272
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27278
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27294
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27273
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27287
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27274
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27284
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27253
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27276
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27306
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27263
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27298
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27295
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27271
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27288
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27310
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27264
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27262
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27257
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27259
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27280
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://secunia.com/advisories/20299
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.osvdb.org/27309
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27291
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27267
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27281
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27282
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27301
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27254
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27268
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27258
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27299
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27300
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27297
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27285
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27286
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27296
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27303
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27279
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27277
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.securityfocus.com/bid/19133
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.osvdb.org/27283
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27261
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27302
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27260
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27266
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27290
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27293
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.osvdb.org/27265
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:31 May, 2006 | 10:06
Updated At:03 Apr, 2025 | 01:03

PHP remote file inclusion vulnerabilities in ActionApps 2.8.1 allow remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[AA_INC_PATH] parameter in (1) cached.php3, (2) cron.php3, (3) discussion.php3, (4) filldisc.php3, (5) filler.php3, (6) fillform.php3, (7) go.php3, (8) hiercons.php3, (9) jsview.php3, (10) live_checkbox.php3, (11) offline.php3, (12) post2shtml.php3, (13) search.php3, (14) slice.php3, (15) sql_update.php3, (16) view.php3, (17) multiple files in the (18) admin/ folder, (19) includes folder, and (20) modules/ folder.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.4MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
Type: Primary
Version: 2.0
Base score: 6.4
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N
CPE Matches

actionapps
actionapps
>>actionapps>>2.8.1
cpe:2.3:a:actionapps:actionapps:2.8.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
CWE ID: CWE-94
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/20299cve@mitre.org
Exploit
Vendor Advisory
http://www.osvdb.org/27253cve@mitre.org
N/A
http://www.osvdb.org/27254cve@mitre.org
N/A
http://www.osvdb.org/27256cve@mitre.org
N/A
http://www.osvdb.org/27257cve@mitre.org
N/A
http://www.osvdb.org/27258cve@mitre.org
N/A
http://www.osvdb.org/27259cve@mitre.org
N/A
http://www.osvdb.org/27260cve@mitre.org
N/A
http://www.osvdb.org/27261cve@mitre.org
N/A
http://www.osvdb.org/27262cve@mitre.org
N/A
http://www.osvdb.org/27263cve@mitre.org
N/A
http://www.osvdb.org/27264cve@mitre.org
N/A
http://www.osvdb.org/27265cve@mitre.org
N/A
http://www.osvdb.org/27266cve@mitre.org
N/A
http://www.osvdb.org/27267cve@mitre.org
N/A
http://www.osvdb.org/27268cve@mitre.org
N/A
http://www.osvdb.org/27269cve@mitre.org
N/A
http://www.osvdb.org/27270cve@mitre.org
N/A
http://www.osvdb.org/27271cve@mitre.org
N/A
http://www.osvdb.org/27272cve@mitre.org
N/A
http://www.osvdb.org/27273cve@mitre.org
N/A
http://www.osvdb.org/27274cve@mitre.org
N/A
http://www.osvdb.org/27275cve@mitre.org
N/A
http://www.osvdb.org/27276cve@mitre.org
N/A
http://www.osvdb.org/27277cve@mitre.org
N/A
http://www.osvdb.org/27278cve@mitre.org
N/A
http://www.osvdb.org/27279cve@mitre.org
N/A
http://www.osvdb.org/27280cve@mitre.org
N/A
http://www.osvdb.org/27281cve@mitre.org
N/A
http://www.osvdb.org/27282cve@mitre.org
N/A
http://www.osvdb.org/27283cve@mitre.org
N/A
http://www.osvdb.org/27284cve@mitre.org
N/A
http://www.osvdb.org/27285cve@mitre.org
N/A
http://www.osvdb.org/27286cve@mitre.org
N/A
http://www.osvdb.org/27287cve@mitre.org
N/A
http://www.osvdb.org/27288cve@mitre.org
N/A
http://www.osvdb.org/27289cve@mitre.org
N/A
http://www.osvdb.org/27290cve@mitre.org
N/A
http://www.osvdb.org/27291cve@mitre.org
N/A
http://www.osvdb.org/27292cve@mitre.org
N/A
http://www.osvdb.org/27293cve@mitre.org
N/A
http://www.osvdb.org/27294cve@mitre.org
N/A
http://www.osvdb.org/27295cve@mitre.org
N/A
http://www.osvdb.org/27296cve@mitre.org
N/A
http://www.osvdb.org/27297cve@mitre.org
N/A
http://www.osvdb.org/27298cve@mitre.org
N/A
http://www.osvdb.org/27299cve@mitre.org
N/A
http://www.osvdb.org/27300cve@mitre.org
N/A
http://www.osvdb.org/27301cve@mitre.org
N/A
http://www.osvdb.org/27302cve@mitre.org
N/A
http://www.osvdb.org/27303cve@mitre.org
N/A
http://www.osvdb.org/27304cve@mitre.org
N/A
http://www.osvdb.org/27305cve@mitre.org
N/A
http://www.osvdb.org/27306cve@mitre.org
N/A
http://www.osvdb.org/27308cve@mitre.org
N/A
http://www.osvdb.org/27309cve@mitre.org
N/A
http://www.osvdb.org/27310cve@mitre.org
N/A
http://www.securityfocus.com/bid/19133cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2006/1997cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/26776cve@mitre.org
N/A
https://www.exploit-db.com/exploits/1829cve@mitre.org
N/A
http://secunia.com/advisories/20299af854a3a-2127-422b-91ae-364da2661108
Exploit
Vendor Advisory
http://www.osvdb.org/27253af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27254af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27256af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27257af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27258af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27259af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27260af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27261af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27262af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27263af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27264af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27265af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27266af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27267af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27268af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27269af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27270af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27271af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27272af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27273af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27274af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27275af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27276af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27277af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27278af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27279af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27280af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27281af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27282af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27283af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27284af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27285af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27286af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27287af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27288af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27289af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27290af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27291af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27292af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27293af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27294af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27295af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27296af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27297af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27298af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27299af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27300af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27301af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27302af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27303af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27304af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27305af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27306af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27308af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27309af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/27310af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/19133af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/1997af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/26776af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.exploit-db.com/exploits/1829af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://secunia.com/advisories/20299
Source: cve@mitre.org
Resource:
Exploit
Vendor Advisory
Hyperlink: http://www.osvdb.org/27253
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27254
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27256
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27257
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27258
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27259
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27260
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27261
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27262
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27263
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27264
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27265
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27266
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27267
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27268
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27269
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27270
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27271
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27272
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27273
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27274
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27275
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27276
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27277
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27278
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27279
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27280
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27281
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27282
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27283
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27284
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27285
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27286
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27287
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27288
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27289
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27290
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27291
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27292
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27293
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27294
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27295
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27296
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27297
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27298
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27299
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27300
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27301
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27302
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27303
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27304
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27305
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27306
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27308
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27309
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/27310
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/19133
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/1997
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/26776
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.exploit-db.com/exploits/1829
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/20299
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Vendor Advisory
Hyperlink: http://www.osvdb.org/27253
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27254
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27256
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27257
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27258
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27259
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27260
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27261
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27262
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27263
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27264
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27265
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27266
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27267
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27268
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27269
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27270
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27271
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27272
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27273
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27274
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27275
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27276
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27277
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27278
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27279
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27280
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27281
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27282
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27283
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27284
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27285
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27286
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27287
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27288
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27289
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27290
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27291
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27292
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27293
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27294
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27295
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27296
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27297
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27298
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27299
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27300
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27301
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27302
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27303
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27304
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27305
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27306
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27308
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27309
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/27310
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/19133
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/1997
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/26776
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.exploit-db.com/exploits/1829
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

10Records found

CVE-2006-0332
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.65% / 69.82%
||
7 Day CHG~0.00%
Published-21 Jan, 2006 | 00:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pantomime in Ecartis 1.0.0 snapshot 20050909 stores e-mail attachments in a publicly accessible directory, which may allow remote attackers to upload arbitrary files.

Action-Not Available
Vendor-ecartisn/a
Product-ecartisn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2012-1919
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.75% / 72.09%
||
7 Day CHG~0.00%
Published-27 Mar, 2012 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CRLF injection vulnerability in mime.php in @Mail WebMail Client in AtMail Open-Source before 1.05 allows remote attackers to conduct directory traversal attacks and read arbitrary files via a %0A sequence followed by a .. (dot dot) in the file parameter.

Action-Not Available
Vendor-atmailn/a
Product-atmail_openn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2006-2860
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-9.35% / 92.44%
||
7 Day CHG~0.00%
Published-06 Jun, 2006 | 20:03
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP remote file inclusion vulnerability in Webspotblogging 3.0.1 allows remote attackers to execute arbitrary PHP code via a URL in the path parameter to (1) inc/logincheck.inc.php, (2) inc/adminheader.inc.php, (3) inc/global.php, or (4) inc/mainheader.inc.php. NOTE: some of these vectors were also reported for 3.0 in a separate disclosure.

Action-Not Available
Vendor-webspotn/a
Product-webspotbloggingn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2006-1039
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-5.85% / 90.20%
||
7 Day CHG~0.00%
Published-07 Mar, 2006 | 11:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP Web Application Server (WebAS) Kernel before 7.0 allows remote attackers to inject arbitrary bytes into the HTTP response and obtain sensitive authentication information, or have other impacts, via a ";%20" followed by encoded HTTP headers.

Action-Not Available
Vendor-n/aSAP SE
Product-sap_web_application_servern/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2009-1102
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-4.13% / 88.17%
||
7 Day CHG~0.00%
Published-25 Mar, 2009 | 23:00
Updated-07 Aug, 2024 | 04:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Virtual Machine in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "code generation."

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-javan/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2020-12013
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.1||CRITICAL
EPSS-0.91% / 74.80%
||
7 Day CHG~0.00%
Published-16 Jul, 2020 | 21:14
Updated-04 Aug, 2024 | 11:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A specially crafted WCF client that interfaces to the may allow the execution of certain arbitrary SQL commands remotely. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior.

Action-Not Available
Vendor-iconicsICONICSMitsubishi Electric Corporation
Product-energy_analytixmc_works64facility_analytixquality_analytixgenesis32hyper_historiansmart_energy_analytixmobilehmigenesis64mc_works32bizvizMC Works32GenBroker32GenBroker64, Platform Services, Workbench, FrameWorX ServerMC Works64
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2007-5298
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-5.84% / 90.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2007 | 18:00
Updated-07 Aug, 2024 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple PHP remote file inclusion vulnerabilities in CMS Creamotion allow remote attackers to execute arbitrary PHP code via a URL in the cfg[document_uri] parameter to (1) _administration/securite.php and (2) _administration/gestion_configurations/save_config.php.

Action-Not Available
Vendor-creamotionn/a
Product-creamotionn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2007-4645
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.59% / 68.23%
||
7 Day CHG~0.00%
Published-31 Aug, 2007 | 23:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQL injection vulnerability in index.php in NMDeluxe 2.0.0 allows remote attackers to execute arbitrary SQL commands via the id parameter in a newspost do action, a different vulnerability than CVE-2006-1108.

Action-Not Available
Vendor-nmdeluxen/a
Product-nmdeluxen/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-0578
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 46.34%
||
7 Day CHG~0.00%
Published-16 May, 2022 | 14:31
Updated-02 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code Injection in publify/publify

Code Injection in GitHub repository publify/publify prior to 9.2.8.

Action-Not Available
Vendor-publify_projectpublify
Product-publifypublify/publify
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2007-4640
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-5.32% / 89.66%
||
7 Day CHG~0.00%
Published-31 Aug, 2007 | 23:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unrestricted file upload vulnerability in index.php in Pakupaku CMS 0.4 and earlier allows remote attackers to upload and execute arbitrary PHP files in uploads/ via an Uploads action.

Action-Not Available
Vendor-pakupakun/a
Product-pakupaku_cmsn/a
CWE ID-CWE-264
Not Available
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
Details not found