execInBackground.php in J-OWAMP Web Interface 2.1b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters to the (1) exe and (2) args parameters, which are used in an exec function call. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
Configurations
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.vupen.com/english/advisories/2006/4905 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30781 - |
Information
Published : 2006-12-10 21:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6454
Mitre link : CVE-2006-6454
CVE.ORG link : CVE-2006-6454
JSON object : View
Products Affected
j-owamp
- web_interface
CWE