5.1

CVE-2006-3013

Exploit
Interpretation conflict in resetpw.php in phpBannerExchange before 2.0 Update 6 allows remote attackers to execute arbitrary SQL commands via an email parameter containing a null (%00) character after a valid e-mail address, which passes the validation check in the eregi PHP command.  NOTE: it could be argued that this vulnerability is due to a bug in the eregi PHP command and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in phpBannerExchange.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Eschew.NetPhpbannerexchange Version2.0
Eschew.NetPhpbannerexchange Version2.0_update_1
Eschew.NetPhpbannerexchange Version2.0_update_2
Eschew.NetPhpbannerexchange Version2.0_update_3
Eschew.NetPhpbannerexchange Version2.0_update_4
Eschew.NetPhpbannerexchange Version2.0_update_5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3.81% 0.877
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.1 4.9 6.4
AV:N/AC:H/Au:N/C:P/I:P/A:P
Es wurden noch keine Informationen zu CWE veröffentlicht.