Vulnerability Details : CVE-2006-5228
Potential exploit
Multiple SQL injection vulnerabilities in the Google Gadget login.php (gadget/login.php) in Rob Hensley ackerTodo 4.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) up_login, (2) up_pass, or (3) up_num_tasks parameters.
Vulnerability category: Sql Injection
Products affected by CVE-2006-5228
- cpe:2.3:a:rob_hensley:ackertodo:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:rob_hensley:ackertodo:4.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5228
1.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-5228
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-5228
-
http://securitytracker.com/id?1017008
-
http://www.securityfocus.com/archive/1/447846/100/0/threaded
-
http://ackertodo.cvs.sourceforge.net/ackertodo/ackertodo/src/gadget/login.php?r1=1.3&r2=1.4
Patch
-
http://www.securityfocus.com/bid/20372
Exploit
-
http://ackertodo.cvs.sourceforge.net/ackertodo/ackertodo/src/gadget/login.php?view=log
Patch
-
http://securityreason.com/securityalert/1703
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/29375
-
http://www.vupen.com/english/advisories/2006/3951
Jump to