CVE-2006-3543

N/A Unknown
Published: July 13, 2006 Modified: April 16, 2026
View on NVD

Description

Multiple SQL injection vulnerabilities in Invision Power Board (IPB) 1.x and 2.x allow remote attackers to execute arbitrary SQL commands via the (1) idcat and (2) code parameters in a ketqua action in index.php; the id parameter in a (3) Attach and (4) ref action in index.php; the CODE parameter in a (5) Profile, (6) Login, and (7) Help action in index.php; and the (8) member_id parameter in coins_list.php. NOTE: the developer has disputed this issue, stating that the "CODE attribute is never present in an SQL query" and the "'ketqua' [action] and file 'coin_list.php' are not standard IPB 2.x features". It is unknown whether these vectors are associated with an independent module or modification of IPB

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.osvdb.org/30084
Source: cve@mitre.org
http://www.securityfocus.com/bid/18836
Source: cve@mitre.org
Exploit
http://securityreason.com/securityalert/1231
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/30084
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/439145/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/439602/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/18836
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.7%
73th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

invision_power_services