Vulnerability Description
SQL injection vulnerability in vuBB 0.2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the user parameter in a register action to index.php, a different vulnerability than CVE-2006-0962.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vubb | Vubb | 0.2 |
References
- http://securityreason.com/securityalert/1948
- http://www.acid-root.new.fr/advisories/vubb021b.txtVendor Advisory
- http://www.securityfocus.com/archive/1/437657/100/200/threaded
- http://www.vupen.com/english/advisories/2006/2458
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27297
- http://securityreason.com/securityalert/1948
- http://www.acid-root.new.fr/advisories/vubb021b.txtVendor Advisory
- http://www.securityfocus.com/archive/1/437657/100/200/threaded
- http://www.vupen.com/english/advisories/2006/2458
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27297
FAQ
What is CVE-2006-6230?
CVE-2006-6230 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in vuBB 0.2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the user parameter in a register action to index.php, a different vulnerability than...
How severe is CVE-2006-6230?
CVE-2006-6230 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6230?
Check the references section above for vendor advisories and patch information. Affected products include: Vubb Vubb.