7.5
CVSSv2

CVE-2006-2097

Published: 29/04/2006 Updated: 18/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in func_msg.php in Invision Power Board (IPB) 2.1.4 allows remote malicious users to execute arbitrary SQL commands via the from_contact field in a private message (PM).

Vulnerable Product Search on Vulmon Subscribe to Product

invision power services invision power board 2.1 beta2

invision power services invision power board 1.0

invision power services invision power board 1.1.2

invision power services invision power board 2.0.4

invision power services invision power board 2.1 rc1

invision power services invision power board 2.1.1

invision power services invision power board 2.1 alpha2

invision power services invision power board 1.1.1

invision power services invision power board 2.1.2

invision power services invision power board 2.1.3

invision power services invision power board 2.1 beta5

invision power services invision power board 1.3 final

invision power services invision power board 2.1.0

invision power services invision power board 1.2

invision power services invision power board 2.0.0

invision power services invision power board 1.0.1

invision power services invision power board

invision power services invision power board 2.0.3

invision power services invision power board 2.1 beta4

invision power services invision power board 2.1

invision power services invision power board 2.1 beta3

invision power services invision power board 1.3.1 final

invision power services invision power board 2.0.2

invision power services invision power board 2.0.1

invision power services invision power board 1.3

invision power services invision power board 2.0.x

Exploits

#!/usr/bin/perl ############################################################################# ## IPB <=214 exploit (possibly 215 too) ## ## Brought to you by the Ykstortion security team ## ## ## ## The bug is in th ...