Vulnerability Description
Multiple SQL injection vulnerabilities in main.php in Chipmailer 1.09 allow remote attackers to execute arbitrary SQL commands via multiple parameters, as demonstrated by (1) anfang, (2) name, (3) mail, (4) anrede, (5) vorname, (6) nachname, (7) gebtag, (8) gebmonat, and (9) gebjahr.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chipmailer | Chipmailer | 1.09 |
References
- http://marc.info/?l=bugtraq&m=115024576618386&w=2
- http://secunia.com/advisories/20643Vendor Advisory
- http://securitytracker.com/id?1016315
- http://www.securityfocus.com/bid/18463
- http://www.vupen.com/english/advisories/2006/2359
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27158
- http://marc.info/?l=bugtraq&m=115024576618386&w=2
- http://secunia.com/advisories/20643Vendor Advisory
- http://securitytracker.com/id?1016315
- http://www.securityfocus.com/bid/18463
- http://www.vupen.com/english/advisories/2006/2359
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27158
FAQ
What is CVE-2006-3111?
CVE-2006-3111 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple SQL injection vulnerabilities in main.php in Chipmailer 1.09 allow remote attackers to execute arbitrary SQL commands via multiple parameters, as demonstrated by (1) anfang, (2) name, (3) mai...
How severe is CVE-2006-3111?
CVE-2006-3111 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3111?
Check the references section above for vendor advisories and patch information. Affected products include: Chipmailer Chipmailer.