Vulnerability Description
admin.php in Himpfen Consulting Company PHP SimpleNEWS 1.0.0 allows remote attackers to bypass authentication by setting the admin parameter in a cookie.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Himpfen Consulting | Php Simplenews | <= 1.0.0 |
References
- http://evuln.com/vulns/94/summary.htmlExploit
- http://secunia.com/advisories/19195ExploitVendor Advisory
- http://securityreason.com/securityalert/613
- http://www.osvdb.org/23803
- http://www.securityfocus.com/archive/1/428427
- http://www.securityfocus.com/bid/17186
- http://www.vupen.com/english/advisories/2006/0913
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25177
- http://evuln.com/vulns/94/summary.htmlExploit
- http://secunia.com/advisories/19195ExploitVendor Advisory
- http://securityreason.com/securityalert/613
- http://www.osvdb.org/23803
- http://www.securityfocus.com/archive/1/428427
- http://www.securityfocus.com/bid/17186
- http://www.vupen.com/english/advisories/2006/0913
FAQ
What is CVE-2006-1276?
CVE-2006-1276 is a vulnerability with a CVSS score of 10.0 (HIGH). admin.php in Himpfen Consulting Company PHP SimpleNEWS 1.0.0 allows remote attackers to bypass authentication by setting the admin parameter in a cookie.
How severe is CVE-2006-1276?
CVE-2006-1276 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1276?
Check the references section above for vendor advisories and patch information. Affected products include: Himpfen Consulting Php Simplenews.