Description
Multiple SQL injection vulnerabilities in While You Were Out (WYWO) InOut Board 1.0 allow remote attackers to execute arbitrary SQL commands via (1) the num parameter in (a) phonemessage.asp, (2) the catcode parameter in (b) faqDsp.asp, and the (3) Username and (4) Password fields in (c) login.asp.
Exploits (1)
References (4)
Core 4
Core References
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23571
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/21803
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/3032
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/31128
Scores
EPSS
0.0091
EPSS Percentile
75.9%
Details
Status
published
Products (1)
cybercoded/while_you_were_out_inout_board
1.0
Published
Dec 31, 2006
Tracked Since
Feb 18, 2026