6.4
MEDIUM
CVE-2006-2686
ActionApps Remote PHP Code Execution
Description

PHP remote file inclusion vulnerabilities in ActionApps 2.8.1 allow remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[AA_INC_PATH] parameter in (1) cached.php3, (2) cron.php3, (3) discussion.php3, (4) filldisc.php3, (5) filler.php3, (6) fillform.php3, (7) go.php3, (8) hiercons.php3, (9) jsview.php3, (10) live_checkbox.php3, (11) offline.php3, (12) post2shtml.php3, (13) search.php3, (14) slice.php3, (15) sql_update.php3, (16) view.php3, (17) multiple files in the (18) admin/ folder, (19) includes folder, and (20) modules/ folder.

INFO

Published Date :

May 31, 2006, 10:06 a.m.

Last Modified :

April 3, 2025, 1:03 a.m.

Remotely Exploitable :

Yes !

Impact Score :

4.9

Exploitability Score :

10.0
Affected Products

The following products are affected by CVE-2006-2686 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Actionapps actionapps
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2006-2686.

URL Resource
http://secunia.com/advisories/20299 Exploit Vendor Advisory
http://www.osvdb.org/27253
http://www.osvdb.org/27254
http://www.osvdb.org/27256
http://www.osvdb.org/27257
http://www.osvdb.org/27258
http://www.osvdb.org/27259
http://www.osvdb.org/27260
http://www.osvdb.org/27261
http://www.osvdb.org/27262
http://www.osvdb.org/27263
http://www.osvdb.org/27264
http://www.osvdb.org/27265
http://www.osvdb.org/27266
http://www.osvdb.org/27267
http://www.osvdb.org/27268
http://www.osvdb.org/27269
http://www.osvdb.org/27270
http://www.osvdb.org/27271
http://www.osvdb.org/27272
http://www.osvdb.org/27273
http://www.osvdb.org/27274
http://www.osvdb.org/27275
http://www.osvdb.org/27276
http://www.osvdb.org/27277
http://www.osvdb.org/27278
http://www.osvdb.org/27279
http://www.osvdb.org/27280
http://www.osvdb.org/27281
http://www.osvdb.org/27282
http://www.osvdb.org/27283
http://www.osvdb.org/27284
http://www.osvdb.org/27285
http://www.osvdb.org/27286
http://www.osvdb.org/27287
http://www.osvdb.org/27288
http://www.osvdb.org/27289
http://www.osvdb.org/27290
http://www.osvdb.org/27291
http://www.osvdb.org/27292
http://www.osvdb.org/27293
http://www.osvdb.org/27294
http://www.osvdb.org/27295
http://www.osvdb.org/27296
http://www.osvdb.org/27297
http://www.osvdb.org/27298
http://www.osvdb.org/27299
http://www.osvdb.org/27300
http://www.osvdb.org/27301
http://www.osvdb.org/27302
http://www.osvdb.org/27303
http://www.osvdb.org/27304
http://www.osvdb.org/27305
http://www.osvdb.org/27306
http://www.osvdb.org/27308
http://www.osvdb.org/27309
http://www.osvdb.org/27310
http://www.securityfocus.com/bid/19133
http://www.vupen.com/english/advisories/2006/1997
https://exchange.xforce.ibmcloud.com/vulnerabilities/26776
https://www.exploit-db.com/exploits/1829
http://secunia.com/advisories/20299 Exploit Vendor Advisory
http://www.osvdb.org/27253
http://www.osvdb.org/27254
http://www.osvdb.org/27256
http://www.osvdb.org/27257
http://www.osvdb.org/27258
http://www.osvdb.org/27259
http://www.osvdb.org/27260
http://www.osvdb.org/27261
http://www.osvdb.org/27262
http://www.osvdb.org/27263
http://www.osvdb.org/27264
http://www.osvdb.org/27265
http://www.osvdb.org/27266
http://www.osvdb.org/27267
http://www.osvdb.org/27268
http://www.osvdb.org/27269
http://www.osvdb.org/27270
http://www.osvdb.org/27271
http://www.osvdb.org/27272
http://www.osvdb.org/27273
http://www.osvdb.org/27274
http://www.osvdb.org/27275
http://www.osvdb.org/27276
http://www.osvdb.org/27277
http://www.osvdb.org/27278
http://www.osvdb.org/27279
http://www.osvdb.org/27280
http://www.osvdb.org/27281
http://www.osvdb.org/27282
http://www.osvdb.org/27283
http://www.osvdb.org/27284
http://www.osvdb.org/27285
http://www.osvdb.org/27286
http://www.osvdb.org/27287
http://www.osvdb.org/27288
http://www.osvdb.org/27289
http://www.osvdb.org/27290
http://www.osvdb.org/27291
http://www.osvdb.org/27292
http://www.osvdb.org/27293
http://www.osvdb.org/27294
http://www.osvdb.org/27295
http://www.osvdb.org/27296
http://www.osvdb.org/27297
http://www.osvdb.org/27298
http://www.osvdb.org/27299
http://www.osvdb.org/27300
http://www.osvdb.org/27301
http://www.osvdb.org/27302
http://www.osvdb.org/27303
http://www.osvdb.org/27304
http://www.osvdb.org/27305
http://www.osvdb.org/27306
http://www.osvdb.org/27308
http://www.osvdb.org/27309
http://www.osvdb.org/27310
http://www.securityfocus.com/bid/19133
http://www.vupen.com/english/advisories/2006/1997
https://exchange.xforce.ibmcloud.com/vulnerabilities/26776
https://www.exploit-db.com/exploits/1829

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2006-2686 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2006-2686 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://secunia.com/advisories/20299
    Added Reference http://www.osvdb.org/27253
    Added Reference http://www.osvdb.org/27254
    Added Reference http://www.osvdb.org/27256
    Added Reference http://www.osvdb.org/27257
    Added Reference http://www.osvdb.org/27258
    Added Reference http://www.osvdb.org/27259
    Added Reference http://www.osvdb.org/27260
    Added Reference http://www.osvdb.org/27261
    Added Reference http://www.osvdb.org/27262
    Added Reference http://www.osvdb.org/27263
    Added Reference http://www.osvdb.org/27264
    Added Reference http://www.osvdb.org/27265
    Added Reference http://www.osvdb.org/27266
    Added Reference http://www.osvdb.org/27267
    Added Reference http://www.osvdb.org/27268
    Added Reference http://www.osvdb.org/27269
    Added Reference http://www.osvdb.org/27270
    Added Reference http://www.osvdb.org/27271
    Added Reference http://www.osvdb.org/27272
    Added Reference http://www.osvdb.org/27273
    Added Reference http://www.osvdb.org/27274
    Added Reference http://www.osvdb.org/27275
    Added Reference http://www.osvdb.org/27276
    Added Reference http://www.osvdb.org/27277
    Added Reference http://www.osvdb.org/27278
    Added Reference http://www.osvdb.org/27279
    Added Reference http://www.osvdb.org/27280
    Added Reference http://www.osvdb.org/27281
    Added Reference http://www.osvdb.org/27282
    Added Reference http://www.osvdb.org/27283
    Added Reference http://www.osvdb.org/27284
    Added Reference http://www.osvdb.org/27285
    Added Reference http://www.osvdb.org/27286
    Added Reference http://www.osvdb.org/27287
    Added Reference http://www.osvdb.org/27288
    Added Reference http://www.osvdb.org/27289
    Added Reference http://www.osvdb.org/27290
    Added Reference http://www.osvdb.org/27291
    Added Reference http://www.osvdb.org/27292
    Added Reference http://www.osvdb.org/27293
    Added Reference http://www.osvdb.org/27294
    Added Reference http://www.osvdb.org/27295
    Added Reference http://www.osvdb.org/27296
    Added Reference http://www.osvdb.org/27297
    Added Reference http://www.osvdb.org/27298
    Added Reference http://www.osvdb.org/27299
    Added Reference http://www.osvdb.org/27300
    Added Reference http://www.osvdb.org/27301
    Added Reference http://www.osvdb.org/27302
    Added Reference http://www.osvdb.org/27303
    Added Reference http://www.osvdb.org/27304
    Added Reference http://www.osvdb.org/27305
    Added Reference http://www.osvdb.org/27306
    Added Reference http://www.osvdb.org/27308
    Added Reference http://www.osvdb.org/27309
    Added Reference http://www.osvdb.org/27310
    Added Reference http://www.securityfocus.com/bid/19133
    Added Reference http://www.vupen.com/english/advisories/2006/1997
    Added Reference https://exchange.xforce.ibmcloud.com/vulnerabilities/26776
    Added Reference https://www.exploit-db.com/exploits/1829
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Oct. 19, 2017

    Action Type Old Value New Value
    Removed Reference http://milw0rm.com/exploits/1829 [Exploit]
    Added Reference https://www.exploit-db.com/exploits/1829 [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 20, 2017

    Action Type Old Value New Value
    Removed Reference http://xforce.iss.net/xforce/xfdb/26776 [No Types Assigned]
    Added Reference https://exchange.xforce.ibmcloud.com/vulnerabilities/26776 [No Types Assigned]
  • Initial Analysis by [email protected]

    May. 31, 2006

    Action Type Old Value New Value
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2006-2686 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2006-2686 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

11.58 }} 0.27%

score

0.93264

percentile

CVSS2 - Vulnerability Scoring System
Access Vector
Access Complexity
Authentication
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Jul. 17, 2025 3:57