Ultimate PHP Board (UPB) 1.9.6 and earlier uses a cryptographically weak block cipher with a large key collision space, which allows remote attackers to determine a suitable decryption key given the plaintext and ciphertext by obtaining the plaintext password, which is sent when logging in, and the ciphertext, which is set in the pass_env cookie.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:13
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://securityreason.com/securityalert/1138 - | |
| References | () http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt - Exploit, URL Repurposed | |
| References | () http://www.securityfocus.com/archive/1/437875/100/0/threaded - | 
14 Feb 2024, 01:17
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt - Exploit, URL Repurposed | 
Information
                Published : 2006-06-24 01:06
Updated : 2025-04-03 01:03
NVD link : CVE-2006-3204
Mitre link : CVE-2006-3204
CVE.ORG link : CVE-2006-3204
JSON object : View
Products Affected
                ultimate_php_board
- ultimate_php_board
CWE
                