CVE-2006-3727

critical

Description

Multiple SQL injection vulnerabilities in Eskolar CMS 0.9.0.0 allow remote attackers to execute arbitrary SQL commands via the (1) gr_1_id, (2) gr_2_id, (3) gr_3_id, and (4) doc_id parameters in (a) index.php; the (5) uid and (6) pwd parameters in (b) php/esa.php; and possibly other vectors related to files in php/lib/ including (c) del.php, (d) download_backup.php, (e) navig.php, (f) restore.php, (g) set_12.php, (h) set_14.php, and (i) upd_doc.php.

References

https://www.exploit-db.com/exploits/2032

https://exchange.xforce.ibmcloud.com/vulnerabilities/27809

https://exchange.xforce.ibmcloud.com/vulnerabilities/27808

http://www.vupen.com/english/advisories/2006/2869

http://www.osvdb.org/27399

http://www.osvdb.org/27398

http://www.osvdb.org/27397

http://www.osvdb.org/27396

http://www.osvdb.org/27395

http://www.osvdb.org/27394

http://www.osvdb.org/27393

http://www.osvdb.org/27392

http://www.osvdb.org/27391

Details

Source: Mitre, NVD

Published: 2006-07-21

Updated: 2026-04-16

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.0263