{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T08:34:53.388","vulnerabilities":[{"cve":{"id":"CVE-2006-4636","sourceIdentifier":"cve@mitre.org","published":"2006-09-08T20:04:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in SZEWO PhpCommander 3.0 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Directory parameter, as demonstrated by parameter values naming Apache HTTP Server log files that apparently contain PHP code."},{"lang":"es","value":"Vulnerabilidad de atravesamiento de directorios en SZEWO PhpCommander 3.0 y anteriores permite a un atacante remoto añadir y ejecutar archivos locales de su elección a través de secuencias de atravesamiento de directorios en el parámetro Directory, según lo demostrado por los valores de parámetro que nombran ficheros de registro del servidor Apache HTTP que contienen aparentemente código PHP."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:szewo:phpcommander:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0","matchCriteriaId":"2957663A-9AD2-46EB-B362-2066B541A463"}]}]}],"references":[{"url":"http://secunia.com/advisories/21753","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/19867","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2006/3472","source":"cve@mitre.org"},{"url":"https://www.exploit-db.com/exploits/2310","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/21753","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/19867","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2006/3472","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/2310","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}