CVE-2006-4189

Public Exploit

Description

Multiple PHP remote file inclusion vulnerabilities in Dolphin 5.1 allow remote attackers to execute arbitrary PHP code via a URL in the dir[inc] parameter in (1) index.php, (2) aemodule.php, (3) browse.php, (4) cc.php, (5) click.php, (6) faq.php, (7) gallery.php, (8) im.php, (9) inbox.php, (10) join_form.php, (11) logout.php, (12) messages_inbox.php, and many other scripts.

5.1
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 2.73% Top 15%
Vendor Advisory secunia.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://securitytracker.com/id?1016692 vdb entry exploit
http://www.osvdb.org/28501 vdb entry exploit
http://www.osvdb.org/28492 vdb entry exploit
http://www.securityfocus.com/bid/21182 vdb entry
http://www.osvdb.org/28527 vdb entry exploit
http://www.osvdb.org/28525 vdb entry exploit
http://www.osvdb.org/28517 vdb entry exploit
http://www.osvdb.org/28499 vdb entry exploit
http://www.osvdb.org/28526 vdb entry exploit
http://www.osvdb.org/28502 vdb entry exploit
http://www.osvdb.org/28515 vdb entry exploit
http://www.osvdb.org/28511 vdb entry exploit
http://www.osvdb.org/28521 vdb entry exploit
http://www.osvdb.org/28479 vdb entry exploit
http://www.osvdb.org/28516 vdb entry exploit
http://www.osvdb.org/28508 vdb entry exploit
http://www.osvdb.org/28507 vdb entry exploit
http://www.osvdb.org/28504 vdb entry exploit
http://www.osvdb.org/28510 vdb entry exploit
http://www.osvdb.org/28514 vdb entry exploit
http://www.osvdb.org/28522 vdb entry exploit
http://www.osvdb.org/28505 vdb entry exploit
http://www.osvdb.org/28529 vdb entry exploit
http://www.osvdb.org/28500 vdb entry exploit
http://www.osvdb.org/28478 vdb entry exploit
http://www.osvdb.org/28509 vdb entry exploit
http://www.osvdb.org/28485 vdb entry exploit
http://www.osvdb.org/28512 vdb entry exploit
http://www.osvdb.org/28528 vdb entry exploit
http://www.osvdb.org/28513 vdb entry exploit
http://secunia.com/advisories/21535 third party advisory vendor advisory
http://www.osvdb.org/28498 vdb entry exploit
http://www.osvdb.org/28493 vdb entry exploit
http://www.osvdb.org/28523 vdb entry exploit
http://www.osvdb.org/28503 vdb entry exploit
http://www.vupen.com/english/advisories/2006/3346 vdb entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/28363 vdb entry
http://www.osvdb.org/28496 vdb entry exploit
http://www.osvdb.org/28473 vdb entry exploit
http://www.osvdb.org/28506 vdb entry exploit
http://www.osvdb.org/28524 vdb entry exploit
http://www.osvdb.org/28520 vdb entry exploit
http://www.osvdb.org/28530 vdb entry exploit
http://www.osvdb.org/28519 vdb entry exploit
http://www.osvdb.org/28474 vdb entry exploit

Frequently Asked Questions

What is the severity of CVE-2006-4189?
CVE-2006-4189 has been scored as a medium severity vulnerability.
How to fix CVE-2006-4189?
To fix CVE-2006-4189, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2006-4189 being actively exploited in the wild?
It is possible that CVE-2006-4189 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~3% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.