Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2006-0644

EPSS 11.98% · P94
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2006-0644

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple directory traversal vulnerabilities in install.php in CPG-Nuke Dragonfly CMS (aka CPG Dragonfly CMS) 9.0.6.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences and a NUL (%00) character in (1) the newlang parameter and (2) the installlang parameter in a cookie, as demonstrated by using error.php to insert malicious code into a log file, or uploading a malicious .png file, which is then included using install.php.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
CPG Dragonfly CMS多个目录遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CPG-Nuke Dragonfly CMS(即CPG Dragonfly CMS)9.0.6.1的install.php中存在多个目录遍历漏洞。远程攻击者可以借助目录遍历序列和cookie中(1) newlang参数和(2) installlang参数的NUL (%00)字符包含并执行任意本地文件(如演示过程中,使用error.php向日志文件中插入恶意代码,或上传随后被install.php包含的恶意.png文件)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2006-0644

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2006-0644

登录查看更多情报信息。

Same Patch Batch · n/a · 2006-02-10 · 20 CVEs total

CVE-2006-0634Borland C++Builder "i>sizeof(int)" 整数溢出漏洞
CVE-2006-0643WiredRed E/POP Web Conferencing 跨站脚本攻击漏洞
CVE-2006-0642Trend Micro ServerProtect已提取文件数超出扫描绕过漏洞
CVE-2006-0641Orbicule Undercover 信息泄露漏洞
CVE-2006-0640Orbicule Undercover '/private/etc/uc.app/Contents/MacOS/uc' 安全权限漏洞
CVE-2006-0639MyBB 'search.php' 跨站脚本攻击漏洞
CVE-2006-0638MyBB Moderation.PHP SQL注入漏洞
CVE-2006-0637QUALCOMM Eudora WorldMai 'cram.dll' 缓冲区溢出漏洞
CVE-2006-0636EyeOS会话远程命令执行漏洞
CVE-2006-0635Tiny C Compiler "i>sizeof(int)" 整数溢出漏洞
CVE-2006-0645GNUTLS LibTASN1 DER 拒绝服务漏洞
CVE-2006-0633Invision Power Board 'ipsclass.php' make_password 功能认证代码创建漏洞
CVE-2006-0632phpBB gen_rand_string功能电子邮件激活密钥安全信息泄露漏洞
CVE-2006-0631Erik C mailback.pl CRLF注入漏洞
CVE-2006-0630Ritlabs The Bat! 报头欺骗漏洞
CVE-2006-0629AOL Instant Messenger 未明漏洞
CVE-2006-0628Dale Ray MyQuiz myquiz.pl 任意代码执行漏洞
CVE-2005-4711Neocrome Land Down Under SQL注入漏洞
CVE-2005-4710Autodesk多个产品远程未授权访问漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2006-0644

No comments yet


Leave a comment