Vulnerability Details : CVE-2006-2583
Potential exploit
PHP remote file inclusion vulnerability in nucleus/libs/PLUGINADMIN.php in Nucleus 3.22 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[DIR_LIBS] parameter.
Vulnerability category: File inclusion
Products affected by CVE-2006-2583
- cpe:2.3:a:nucleus_group:nucleus_cms:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-2583
6.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-2583
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2006-2583
-
http://www.vupen.com/english/advisories/2006/1936
-
http://securitytracker.com/id?1016146
-
http://www.osvdb.org/25749
-
http://www.nucleuscms.org/item/3038
-
http://www.securityfocus.com/archive/1/434837/100/0/threaded
-
http://forum.nucleuscms.org/viewtopic.php?t=12304
-
http://retrogod.altervista.org/nucleus_322_incl_xpl.html
Error 404 :(Exploit
-
http://secunia.com/advisories/20219
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/18097
-
http://securityreason.com/securityalert/951
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/26606
Jump to