CVE-2006-6454
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
execInBackground.php in J-OWAMP Web Interface 2.1b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters to the (1) exe and (2) args parameters, which are used in an exec function call. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
execInBackground.php en J-OWAMP Web Interface 2.1b y anteriores permite a un atacante remoto ejecutar comandos de su elección a través de los metacaracteres de la shell a los parámetros (1) exe y (2) args, los los cuales son usados en función de llamada exec. NOTA: la procedencia de esta información es desconocida; los detalles han sido obtenidos a partir de la información de terceros.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-12-10 CVE Reserved
- 2006-12-10 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.vupen.com/english/advisories/2006/4905 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30781 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
J-owamp Search vendor "J-owamp" | Web Interface Search vendor "J-owamp" for product "Web Interface" | <= 2.1b Search vendor "J-owamp" for product "Web Interface" and version " <= 2.1b" | - |
Affected
|