SQL injection vulnerability in the u2u_send_recp function in u2u.inc.php in XMB (aka extreme message board) 1.9.6 Alpha and earlier allows remote attackers to execute arbitrary SQL commands via the u2uid parameter to u2u.php, which is directly accessed from $_POST and bypasses the protection scheme.
References
Configurations
History
21 Nov 2024, 00:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21293 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/19280 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/3088 - | |
References | () https://docs.xmbforum2.com/index.php?title=Security_Issue_History - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28159 - | |
References | () https://www.exploit-db.com/exploits/2105 - |
Information
Published : 2006-08-05 00:04
Updated : 2024-11-21 00:14
NVD link : CVE-2006-3994
Mitre link : CVE-2006-3994
CVE.ORG link : CVE-2006-3994
JSON object : View
Products Affected
xmb_software
- xmb_forum
CWE