Vulnerability Description
The WeOnlyDo! SFTP (wodSFTP) ActiveX control is marked as safe for scripting, which allows remote attackers to read and write files in arbitrary locations by accessing the control from a web page.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Weonlydo | Weonlydo Sftp | All versions |
References
- http://secunia.com/advisories/20361
- http://www.kb.cert.org/vuls/id/378604US Government Resource
- http://www.securityfocus.com/bid/18192
- http://www.vupen.com/english/advisories/2006/2064
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26752
- http://secunia.com/advisories/20361
- http://www.kb.cert.org/vuls/id/378604US Government Resource
- http://www.securityfocus.com/bid/18192
- http://www.vupen.com/english/advisories/2006/2064
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26752
FAQ
What is CVE-2006-1175?
CVE-2006-1175 is a vulnerability with a CVSS score of 4.0 (MEDIUM). The WeOnlyDo! SFTP (wodSFTP) ActiveX control is marked as safe for scripting, which allows remote attackers to read and write files in arbitrary locations by accessing the control from a web page.
How severe is CVE-2006-1175?
CVE-2006-1175 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1175?
Check the references section above for vendor advisories and patch information. Affected products include: Weonlydo Weonlydo Sftp.