7.5
CVSSv2

CVE-2006-0757

Published: 18/02/2006 Updated: 20/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple eval injection vulnerabilities in HiveMail 1.3 and previous versions allow remote malicious users to execute arbitrary PHP code via (1) the contactgroupid parameter in addressbook.update.php, (2) the messageid parameter in addressbook.add.php, (3) the folderid parameter in folders.update.php, and possibly certain parameters in (4) calendar.event.php, (5) index.php, (6) pop.download.php, (7) read.bounce.php, (8) rules.block.php, (9) language.php, and (10) certain other scripts, as demonstrated by an addressbook.update.php request with a contactgroupid value of phpinfo() preceded by facilitators.

Vulnerable Product Search on Vulmon Subscribe to Product

hivemail hivemail 1.2_sp1

hivemail hivemail 1.3

hivemail hivemail 1.1

hivemail hivemail 1.1.1

hivemail hivemail 1.3_beta1

hivemail hivemail 1.3_rc1

hivemail hivemail 1.2.1_rc

hivemail hivemail 1.2.2

hivemail hivemail 1.2

hivemail hivemail 1.2.1_beta1

Exploits

source: wwwsecurityfocuscom/bid/16591/info HiveMail is prone to multiple vulnerabilities These vulnerabilities may allow the execution of arbitrary PHP code, cross-site scripting attacks, and SQL injection The PHP code-execution issues are the result of an input-validation error that may allow user-supplied PHP code to be evaluated b ...
source: wwwsecurityfocuscom/bid/16591/info HiveMail is prone to multiple vulnerabilities These vulnerabilities may allow the execution of arbitrary PHP code, cross-site scripting attacks, and SQL injection The PHP code-execution issues are the result of an input-validation error that may allow user-supplied PHP code to be evaluated by ...
#!/usr/bin/perl # # # # HiveMail <= 13 remote command execution exploit # # # ################################################################################# # ...