FKIE_CVE-2006-2763

Vulnerability from fkie_nvd - Published: 2006-06-02 01:02 - Updated: 2026-04-16 00:27
Severity ?
Summary
SQL injection vulnerability in Pre News Manager 1.0 allows remote attackers to execute arbitrary SQL commands via the (1) id parameter to (a) index.php, and the (2) nid parameter to (b) news_detail.php, (c) email_story.php, (d) thankyou.php, (e) printable_view.php, (f) tella_friend.php, and (g) send_comments.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. It is possible that this is primary to CVE-2006-2678.
References
cve@mitre.orghttp://secunia.com/advisories/20284Vendor Advisory
cve@mitre.orghttp://www.osvdb.org/26073
cve@mitre.orghttp://www.osvdb.org/26074
cve@mitre.orghttp://www.osvdb.org/26075
cve@mitre.orghttp://www.osvdb.org/26076
cve@mitre.orghttp://www.osvdb.org/26077
cve@mitre.orghttp://www.osvdb.org/26078
cve@mitre.orghttp://www.osvdb.org/26079
cve@mitre.orghttp://www.securityfocus.com/archive/1/493369/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/497185/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/497219/100/0/threaded
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1990
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/34035
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/43070
cve@mitre.orghttps://www.exploit-db.com/exploits/5803
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20284Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26073
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26074
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26075
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26076
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26077
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26078
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26079
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493369/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/497185/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/497219/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1990
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/34035
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/43070
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/5803
Impacted products
Vendor Product Version
pre_projects pre_news_manager 1.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:pre_projects:pre_news_manager:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01DCAFE-70C1-4769-A41D-ABAC92F3965A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in Pre News Manager 1.0 allows remote attackers to execute arbitrary SQL commands via the (1) id parameter to (a) index.php, and the (2) nid parameter to (b) news_detail.php, (c) email_story.php, (d) thankyou.php, (e) printable_view.php, (f) tella_friend.php, and (g) send_comments.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.  It is possible that this is primary to CVE-2006-2678."
    }
  ],
  "id": "CVE-2006-2763",
  "lastModified": "2026-04-16T00:27:16.627",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-06-02T01:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20284"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26073"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26074"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26075"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26076"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26077"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26078"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26079"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/493369/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/497185/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/497219/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1990"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34035"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43070"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26074"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26078"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493369/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/497185/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/497219/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1990"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34035"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43070"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5803"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…