CVE-2006-3275

SQL injection vulnerability in profile.php in YaBB SE 1.5.5 and earlier allows remote attackers to execute SQL commands via a double-encoded user parameter in a viewprofile action.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:yabb:yabb:*:*:second_edition:*:*:*:*:*
cpe:2.3:a:yabb:yabb:1.5.1:*:second_edition:*:*:*:*:*
cpe:2.3:a:yabb:yabb:1.5.2:*:second_edition:*:*:*:*:*
cpe:2.3:a:yabb:yabb:1.5.4:*:second_edition:*:*:*:*:*

History

21 Nov 2024, 00:13

Type Values Removed Values Added
References () http://marc.info/?l=full-disclosure&m=115102378824221&w=2 - () http://marc.info/?l=full-disclosure&m=115102378824221&w=2 -
References () http://secunia.com/advisories/20780 - Vendor Advisory () http://secunia.com/advisories/20780 - Vendor Advisory
References () http://www.securityfocus.com/bid/18625 - () http://www.securityfocus.com/bid/18625 -
References () http://www.vupen.com/english/advisories/2006/2504 - () http://www.vupen.com/english/advisories/2006/2504 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27331 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27331 -

Information

Published : 2006-06-28 22:05

Updated : 2024-11-21 00:13


NVD link : CVE-2006-3275

Mitre link : CVE-2006-3275

CVE.ORG link : CVE-2006-3275


JSON object : View

Products Affected

yabb

  • yabb