Vulnerability Description
Multiple SQL injection vulnerabilities in MWNewsletter 1.0.0b allow remote attackers to execute arbitrary SQL commands via the (1) user_email parameter to (a) unsubscribe.php or (b) subscribe.php; or the (2) user_name parameter to subscribe.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information, although it is likely that this was discovered during post-disclosure analysis.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Manic Web | Mwnewsletter | 1.0.0b |
References
- http://secunia.com/advisories/19568Vendor Advisory
- http://www.osvdb.org/24445
- http://www.osvdb.org/24905
- http://www.vupen.com/english/advisories/2006/1270
- http://secunia.com/advisories/19568Vendor Advisory
- http://www.osvdb.org/24445
- http://www.osvdb.org/24905
- http://www.vupen.com/english/advisories/2006/1270
FAQ
What is CVE-2006-1692?
CVE-2006-1692 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple SQL injection vulnerabilities in MWNewsletter 1.0.0b allow remote attackers to execute arbitrary SQL commands via the (1) user_email parameter to (a) unsubscribe.php or (b) subscribe.php; or ...
How severe is CVE-2006-1692?
CVE-2006-1692 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1692?
Check the references section above for vendor advisories and patch information. Affected products include: Manic Web Mwnewsletter.