Vulnerability Details : CVE-2006-7115
SQL injection vulnerability in PHPKit 1.6.1 RC2 allows remote attackers to inject arbitrary SQL commands via the catid parameter to include.php when the path parameter is set to faq/faq.php, and other unspecified vectors involving guestbook/print.php.
Vulnerability category: Sql Injection
Products affected by CVE-2006-7115
- cpe:2.3:a:phpkit:phpkit:1.6.1:rc2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-7115
1.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-7115
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-7115
-
http://www.securityfocus.com/bid/21002
Exploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30209
-
http://www.bb-pcsecurity.de/websecurity/532/org/PHPKit_1.6.1_RC2_(faq-faq.php)_Remote_SQL_Injection_Exploit.htm
-
http://securityreason.com/securityalert/2357
-
http://www.securityfocus.com/archive/1/451304/100/0/threaded
Jump to