Vulnerability Details : CVE-2006-6177
SQL injection vulnerability in system/core/users/users.profile.inc.php in Neocrome Seditio 1.10 and earlier allows remote authenticated users to execute arbitrary SQL commands via a double-url-encoded id parameter to users.php that begins with a valid filename, as demonstrated by "default.gif" followed by an encoded NULL and ' (apostrophe) (%2500%2527).
Vulnerability category: Sql Injection
Products affected by CVE-2006-6177
- cpe:2.3:a:neocrome:seditio:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-6177
1.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-6177
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-6177
-
http://securityreason.com/securityalert/1931
-
http://www.nukedx.com/?getxpl=52
Exploit
-
http://www.securityfocus.com/archive/1/452269/100/100/threaded
-
http://www.neocrome.net/page.php?id=2233
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30466
-
http://www.vupen.com/english/advisories/2006/4668
-
http://www.nukedx.com/?viewdoc=52
Exploit
Jump to