Vulnerability Description
SQL injection vulnerability in profile.php in YaBB SE 1.5.5 and earlier allows remote attackers to execute SQL commands via a double-encoded user parameter in a viewprofile action.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yabb | Yabb | <= 1.5.5 |
References
- http://marc.info/?l=full-disclosure&m=115102378824221&w=2
- http://secunia.com/advisories/20780Vendor Advisory
- http://www.securityfocus.com/bid/18625
- http://www.vupen.com/english/advisories/2006/2504
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27331
- http://marc.info/?l=full-disclosure&m=115102378824221&w=2
- http://secunia.com/advisories/20780Vendor Advisory
- http://www.securityfocus.com/bid/18625
- http://www.vupen.com/english/advisories/2006/2504
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27331
FAQ
What is CVE-2006-3275?
CVE-2006-3275 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in profile.php in YaBB SE 1.5.5 and earlier allows remote attackers to execute SQL commands via a double-encoded user parameter in a viewprofile action.
How severe is CVE-2006-3275?
CVE-2006-3275 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3275?
Check the references section above for vendor advisories and patch information. Affected products include: Yabb Yabb.