Vulnerability Details : CVE-2006-5727
Potential exploit
PHP remote file inclusion vulnerability in admin/controls/cart.php in sazcart 1.5 allows remote attackers to execute arbitrary PHP code via the (1) _saz[settings][shippingfolder] and (2) _saz[settings][taxfolder] parameters.
Vulnerability category: File inclusion
Products affected by CVE-2006-5727
- cpe:2.3:a:sazcart:sazcart:1.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5727
16.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-5727
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2006-5727
-
http://www.securityfocus.com/bid/20922
-
http://www.osvdb.org/30194
-
http://www.vupen.com/english/advisories/2006/4343
Site en construction
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30013
-
http://www.securityfocus.com/archive/1/456542/100/0/threaded
-
http://www.attrition.org/pipermail/vim/2007-January/001232.html
-
http://secunia.com/advisories/22708
About Secunia Research | FlexeraExploit;Vendor Advisory
-
https://www.exploit-db.com/exploits/2718
SazCart 1.5 - 'cart.php' Remote File Inclusion - PHP webapps Exploit
Jump to