CVE-2006-6549
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
PHP remote file inclusion vulnerability in upload.php in Rad Upload 3.02 allows remote attackers to execute arbitrary PHP code via a URL in the save_path parameter. NOTE: CVE disputes this vulnerability because save_path is originally defined as "" before use, and the nearby instructions say "SET THE SAVE PATH by editing the line below.
** IMPUGNADO ** Vulnerabilidad de inclusión remota de archivo en PHP en upload.php de Rad Upload 3.02 permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro save_path. NOTA: CVE impugna esta vulnerabilidad porque save_path se define originalmente como "" antes de ser usado, y la instrucción dice "Introduzca la ruta de guardado editando la línea de abajo".
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-12-14 CVE Reserved
- 2006-12-14 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/2034 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/454175/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30864 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rad Inks Search vendor "Rad Inks" | Rad Upload Search vendor "Rad Inks" for product "Rad Upload" | 3.02 Search vendor "Rad Inks" for product "Rad Upload" and version "3.02" | - |
Affected
|