Description
Multiple SQL injection vulnerabilities in index.php in PHP Arena paCheckBook 1.1 allow remote attackers to execute arbitrary SQL commands via (1) the transtype parameter in an add action or (2) entry parameter in an edit action. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
Exploits (1)
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/25349
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/20008
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1691
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17821
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/26356
Exploit x_refsource_misc
http://downloads.securityfocus.com/vulnerabilities/exploits/pacheckbook-1.1-mutlsql.txt
Scores
EPSS
0.0055
EPSS Percentile
68.2%
Details
Status
published
Products (1)
php_arena/pacheckbook
1.1
Published
May 05, 2006
Tracked Since
Feb 18, 2026