// For flags

CVE-2006-4877

PHP-post Web Forum 0.x.1.0 - 'profile.php' Multiple SQL Injections

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Variable overwrite vulnerability in David Bennett PHP-Post (PHPp) 1.0 and earlier allows remote attackers to overwrite arbitrary program variables via multiple vectors that use the extract function, as demonstrated by the table_prefix parameter in (1) index.php, (2) profile.php, and (3) header.php.

Vulnerabilidad de sobreescritura de variable en David Bennett PHP-Post (PHPp) 1.0 y anteriores permite a atacantes remotos sobreescribir variables de programa de su elección vía múltiples vectores que usan la función extract, como ha sido demostrado por el parámetro table_prefix en (1) index.php, (2) profile.php y (3) header.php.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-09-16 First Exploit
  • 2006-09-19 CVE Reserved
  • 2006-09-19 CVE Published
  • 2023-08-31 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
David Bennett
Search vendor "David Bennett"
Php-post
Search vendor "David Bennett" for product "Php-post"
<= 1.0
Search vendor "David Bennett" for product "Php-post" and version " <= 1.0"
-
Affected