Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2006-1031
config/config_inc.php in iGENUS Webmail 2.02 and earlier allows remote attackers to include arbitrary local files via the SG_HOME parameter.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.053
EPSS Ranking
89.6%
CVSS Severity
CVSS v2 Score
7.5
References
http://retrogod.altervista.org/igenus_202_xpl_pl.html
http://secunia.com/advisories/19036
http://www.osvdb.org/23530
http://www.securityfocus.com/bid/16829
http://www.vupen.com/english/advisories/2006/0753
https://exchange.xforce.ibmcloud.com/vulnerabilities/24935
http://retrogod.altervista.org/igenus_202_xpl_pl.html
http://secunia.com/advisories/19036
http://www.osvdb.org/23530
http://www.securityfocus.com/bid/16829
http://www.vupen.com/english/advisories/2006/0753
https://exchange.xforce.ibmcloud.com/vulnerabilities/24935
Products affected by CVE-2006-1031
Igenus
»
Igenus Webmail
»
Version:
2.0
cpe:2.3:a:igenus:igenus_webmail:2.0
Igenus
»
Igenus Webmail
»
Version:
2.01
cpe:2.3:a:igenus:igenus_webmail:2.01
Igenus
»
Igenus Webmail
»
Version:
2.02
cpe:2.3:a:igenus:igenus_webmail:2.02
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved