Vulnerability Details : CVE-2006-0754
Potential exploit
dotProject 2.0.1 and earlier allows remote attackers to obtain sensitive information via direct requests with an invalid baseDir to certain PHP scripts in the db directory, which reveal the path in an error message. NOTE: the vendor disputes this issue, saying that it could only occur if the administrator ignores the installation instructions as well as warnings generated by check.php
Products affected by CVE-2006-0754
- cpe:2.3:a:dotproject:dotproject:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:dotproject:dotproject:2.0.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-0754
0.96%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-0754
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2006-0754
-
http://www.securityfocus.com/bid/16648
Exploit
-
http://secunia.com/advisories/18879
About Secunia Research | FlexeraVendor Advisory
-
http://www.securityfocus.com/archive/1/424957/100/0/threaded
-
http://www.osvdb.org/23206
404 Not Found
-
http://www.vupen.com/english/advisories/2006/0604
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://www.securityfocus.com/archive/1/425285/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24745
dotproject phpinfo.php and check.php information disclosure CVE-2006-0756 Vulnerability Report
Jump to