Vulnerability Description
SQL injection vulnerability in rss.php in Article Script 1.6.3 and earlier allows remote attackers to execute arbitrary SQL commands via the category parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Article Script | Article Script | <= 1.6.3 |
References
- http://secunia.com/advisories/22698Vendor Advisory
- http://securityreason.com/securityalert/1826
- http://www.blogcu.com/Liz0ziM/1312100ExploitURL Repurposed
- http://www.securityfocus.com/archive/1/450678Exploit
- http://www.securityfocus.com/bid/20929Exploit
- http://www.vupen.com/english/advisories/2006/4352
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30038
- http://secunia.com/advisories/22698Vendor Advisory
- http://securityreason.com/securityalert/1826
- http://www.blogcu.com/Liz0ziM/1312100ExploitURL Repurposed
- http://www.securityfocus.com/archive/1/450678Exploit
- http://www.securityfocus.com/bid/20929Exploit
- http://www.vupen.com/english/advisories/2006/4352
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30038
FAQ
What is CVE-2006-5765?
CVE-2006-5765 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in rss.php in Article Script 1.6.3 and earlier allows remote attackers to execute arbitrary SQL commands via the category parameter.
How severe is CVE-2006-5765?
CVE-2006-5765 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5765?
Check the references section above for vendor advisories and patch information. Affected products include: Article Script Article Script.