[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-0147Date: (C)2006-01-09   (M)2023-12-22


Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
EXPLOIT-DB-1663
SECUNIA-17418
SECUNIA-18233
SECUNIA-18254
SECUNIA-18260
SECUNIA-18267
SECUNIA-18276
SECUNIA-19555
SECUNIA-19590
SECUNIA-19591
SECUNIA-19600
SECUNIA-19628
SECUNIA-19691
http://www.securityfocus.com/archive/1/430448/100/0/threaded
http://www.securityfocus.com/archive/1/430743/100/0/threaded
OSVDB-22291
ADV-2006-0101
ADV-2006-0102
ADV-2006-0103
ADV-2006-0104
ADV-2006-1305
ADV-2006-1332
DSA-1029
DSA-1030
DSA-1031
GLSA-200604-07
adodb-tmssql-command-execution(24052)
http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.html
http://retrogod.altervista.org/simplog_092_incl_xpl.html
http://secunia.com/secunia_research/2005-64/advisory/

CPE    1
cpe:/a:moodle:moodle:1.5.3

© SecPod Technologies