7.5
CVSSv2

CVE-2006-2097

Published: 29/04/2006 Updated: 18/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in func_msg.php in Invision Power Board (IPB) 2.1.4 allows remote malicious users to execute arbitrary SQL commands via the from_contact field in a private message (PM).

Vulnerable Product Search on Vulmon Subscribe to Product

invision power services invision power board 1.3

invision power services invision power board 1.3.1_final

invision power services invision power board 2.0.x

invision power services invision power board 2.1

invision power services invision power board 2.1.0

invision power services invision power board 2.1_beta4

invision power services invision power board 2.1_beta5

invision power services invision power board 1.0.1

invision power services invision power board 1.1.1

invision power services invision power board 2.0.1

invision power services invision power board 2.0.2

invision power services invision power board 2.1.3

invision power services invision power board 2.1_alpha2

invision power services invision power board 1.1.2

invision power services invision power board 1.2

invision power services invision power board 2.0.3

invision power services invision power board 2.0.4

invision power services invision power board 2.1_beta2

invision power services invision power board 2.1_beta3

invision power services invision power board 1.0

invision power services invision power board 1.3_final

invision power services invision power board 2.0.0

invision power services invision power board 2.1.1

invision power services invision power board 2.1.2

invision power services invision power board 2.1_rc1

invision power services invision power board

Exploits

#!/usr/bin/perl ############################################################################# ## IPB <=214 exploit (possibly 215 too) ## ## Brought to you by the Ykstortion security team ## ## ## ## The bug is in th ...