CVE-2006-6592

Bloq 0.5.4 - RCE

Title source: llm
STIX 2.1

Description

Multiple PHP remote file inclusion vulnerabilities in Bloq 0.5.4 allow remote attackers to execute arbitrary PHP code via a URL in the page[path] parameter to (1) index.php, (2) admin.php, (3) rss.php, (4) rdf.php, (5) rss2.php, or (6) files/mainfile.php.

Exploits (6)

exploitdb WRITEUP VERIFIED
by KorsaN · textwebappsphp
https://www.exploit-db.com/exploits/28800
exploitdb WRITEUP VERIFIED
by KorsaN · textwebappsphp
https://www.exploit-db.com/exploits/28799
exploitdb WRITEUP VERIFIED
by KorsaN · textwebappsphp
https://www.exploit-db.com/exploits/28801
exploitdb WRITEUP VERIFIED
by KorsaN · textwebappsphp
https://www.exploit-db.com/exploits/28797
exploitdb WORKING POC VERIFIED
by KorsaN · textwebappsphp
https://www.exploit-db.com/exploits/28798
exploitdb WRITEUP VERIFIED
by KorsaN · textwebappsphp
https://www.exploit-db.com/exploits/28802

References (4)

Core 4
Core References
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/2039
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/448603/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/20512
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/29585

Scores

EPSS 0.0174
EPSS Percentile 82.6%

Details

Status published
Products (1)
php/bloq 0.5.4
Published Dec 15, 2006
Tracked Since Feb 18, 2026