CVE-2006-5841

N/A Unknown
Published: November 10, 2006 Modified: April 23, 2026
View on NVD

Description

Multiple PHP remote file inclusion vulnerabilities in dodosmail.php in DodosMail 2.0.1 and earlier, and possibly 2.1, allow remote attackers to execute arbitrary PHP code via a URL in the (1) dodosmail_header_file or (2) dodosmail_footer_file parameters.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/22775
Source: cve@mitre.org
Exploit Vendor Advisory
http://www.osvdb.org/30248
Source: cve@mitre.org
http://secunia.com/advisories/22775
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://www.osvdb.org/30248
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/452130/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/4414
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/30099
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/2742
Source: af854a3a-2127-422b-91ae-364da2661108

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
16.4%
95th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

dodos_scripts