Executive Summary

Name CVE-2006-3015 First vendor Publication 2006-06-14
Vendor Cve Last vendor Modification 2017-07-20

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:C/I:C/A:N)
Cvss Base Score 7.1 Attack Range Network
Cvss Impact Score 9.2 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Argument injection vulnerability in WinSCP 3.8.1 build 328 allows remote attackers to upload or download arbitrary files via encoded spaces and double-quote characters in a scp or sftp URI.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3015

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
CAPEC-88 OS Command Injection
CAPEC-133 Try All Common Application Switches and Options

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

CPE : Common Platform Enumeration

Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
26338 WinSCP scp/sftp Protocol Handler Arbitrary Command Injection

Nessus® Vulnerability Scanner

Date Description
2006-06-21 Name : The remote Windows host has an application that allows arbitrary file access.
File : winscp_uri_handler_file_access.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/18384
CERT-VN http://www.kb.cert.org/vuls/id/912588
CONFIRM http://winscp.net/eng/docs/history#3.8.2
FULLDISC http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0196.html
SECUNIA http://secunia.com/advisories/20575
VUPEN http://www.vupen.com/english/advisories/2006/2289
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/27075

Alert History

If you want to see full details history, please login or register.
Date Informations
2021-05-04 12:04:09
  • Multiple Updates
2021-04-22 01:04:46
  • Multiple Updates
2020-05-23 00:17:56
  • Multiple Updates
2017-07-20 09:23:40
  • Multiple Updates
2016-04-26 14:44:53
  • Multiple Updates
2014-02-17 10:36:11
  • Multiple Updates
2013-05-11 11:00:31
  • Multiple Updates