// For flags

CVE-2006-6454

 

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

execInBackground.php in J-OWAMP Web Interface 2.1b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters to the (1) exe and (2) args parameters, which are used in an exec function call. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

execInBackground.php en J-OWAMP Web Interface 2.1b y anteriores permite a un atacante remoto ejecutar comandos de su elección a través de los metacaracteres de la shell a los parámetros (1) exe y (2) args, los los cuales son usados en función de llamada exec. NOTA: la procedencia de esta información es desconocida; los detalles han sido obtenidos a partir de la información de terceros.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-12-10 CVE Reserved
  • 2006-12-10 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-15 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
J-owamp
Search vendor "J-owamp"
Web Interface
Search vendor "J-owamp" for product "Web Interface"
<= 2.1b
Search vendor "J-owamp" for product "Web Interface" and version " <= 2.1b"
-
Affected