Vulnerability Description
SQL injection vulnerability in functions/db_api.php in LinPHA 1.1.1 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linpha | Linpha | 1.0 |
References
- http://attrition.org/pipermail/vim/2006-April/000709.html
- http://secunia.com/advisories/19719PatchVendor Advisory
- http://www.osvdb.org/24817
- http://www.securityfocus.com/bid/17619
- http://www.vupen.com/english/advisories/2006/1424
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26268
- http://attrition.org/pipermail/vim/2006-April/000709.html
- http://secunia.com/advisories/19719PatchVendor Advisory
- http://www.osvdb.org/24817
- http://www.securityfocus.com/bid/17619
- http://www.vupen.com/english/advisories/2006/1424
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26268
FAQ
What is CVE-2006-1924?
CVE-2006-1924 is a vulnerability with a CVSS score of 6.4 (MEDIUM). SQL injection vulnerability in functions/db_api.php in LinPHA 1.1.1 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
How severe is CVE-2006-1924?
CVE-2006-1924 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1924?
Check the references section above for vendor advisories and patch information. Affected products include: Linpha Linpha.