CVE-2006-6846

WYWO InOut Board 1.0 - SQL Injection

Title source: llm
STIX 2.1

Description

Multiple SQL injection vulnerabilities in While You Were Out (WYWO) InOut Board 1.0 allow remote attackers to execute arbitrary SQL commands via (1) the num parameter in (a) phonemessage.asp, (2) the catcode parameter in (b) faqDsp.asp, and the (3) Username and (4) Password fields in (c) login.asp.

Exploits (1)

exploitdb WORKING POC VERIFIED
by ajann · textwebappsasp
https://www.exploit-db.com/exploits/3032

References (4)

Core 4
Core References
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/23571
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/21803
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/3032
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/31128

Scores

EPSS 0.0091
EPSS Percentile 75.9%

Details

Status published
Products (1)
cybercoded/while_you_were_out_inout_board 1.0
Published Dec 31, 2006
Tracked Since Feb 18, 2026