{"api_version":"1","generated_at":"2026-05-10T11:01:14+00:00","cve":"CVE-2006-2209","urls":{"html":"https://cve.report/CVE-2006-2209","api":"https://cve.report/api/cve/CVE-2006-2209.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-2209","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-2209"},"summary":{"title":"CVE-2006-2209","description":"Multiple SQL injection vulnerabilities in index.php in PHP Arena paCheckBook 1.1 allow remote attackers to execute arbitrary SQL commands via (1) the transtype parameter in an add action or (2) entry parameter in an edit action.  NOTE: the provenance of this information is unknown; the details are obtained from third party information.","state":"PUBLISHED","assigner":"mitre","published_at":"2006-05-05 12:46:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"6.4","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://www.osvdb.org/25349","name":"http://www.osvdb.org/25349","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.securityfocus.com/bid/17821","name":"http://www.securityfocus.com/bid/17821","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"Pacheckbook Index.PHP Multiple SQL Injection Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://downloads.securityfocus.com/vulnerabilities/exploits/pacheckbook-1.1-mutlsql.txt","name":"http://downloads.securityfocus.com/vulnerabilities/exploits/pacheckbook-1.1-mutlsql.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"","mime":"text/plain","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/20008","name":"http://secunia.com/advisories/20008","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - PHP Arena paCheckbook Multiple SQL Injection Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26356","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26356","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1691","name":"http://www.vupen.com/english/advisories/2006/1691","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-2209","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2209","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"2209","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_arena","cpe5":"pacheckbook","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2006","cve_id":"2209","cve":"CVE-2006-2209","epss":"0.005530000","percentile":"0.680760000","score_date":"2026-04-20","updated_at":"2026-04-21 00:07:48"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T17:43:28.478Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"25349","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25349"},{"name":"20008","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20008"},{"name":"ADV-2006-1691","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1691"},{"name":"17821","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/17821"},{"name":"pacheckbook-index-sql-injection(26356)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26356"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://downloads.securityfocus.com/vulnerabilities/exploits/pacheckbook-1.1-mutlsql.txt"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-05-03T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple SQL injection vulnerabilities in index.php in PHP Arena paCheckBook 1.1 allow remote attackers to execute arbitrary SQL commands via (1) the transtype parameter in an add action or (2) entry parameter in an edit action.  NOTE: the provenance of this information is unknown; the details are obtained from third party information."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-19T15:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"25349","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25349"},{"name":"20008","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20008"},{"name":"ADV-2006-1691","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1691"},{"name":"17821","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/17821"},{"name":"pacheckbook-index-sql-injection(26356)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26356"},{"tags":["x_refsource_MISC"],"url":"http://downloads.securityfocus.com/vulnerabilities/exploits/pacheckbook-1.1-mutlsql.txt"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-2209","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple SQL injection vulnerabilities in index.php in PHP Arena paCheckBook 1.1 allow remote attackers to execute arbitrary SQL commands via (1) the transtype parameter in an add action or (2) entry parameter in an edit action.  NOTE: the provenance of this information is unknown; the details are obtained from third party information."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"25349","refsource":"OSVDB","url":"http://www.osvdb.org/25349"},{"name":"20008","refsource":"SECUNIA","url":"http://secunia.com/advisories/20008"},{"name":"ADV-2006-1691","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1691"},{"name":"17821","refsource":"BID","url":"http://www.securityfocus.com/bid/17821"},{"name":"pacheckbook-index-sql-injection(26356)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26356"},{"name":"http://downloads.securityfocus.com/vulnerabilities/exploits/pacheckbook-1.1-mutlsql.txt","refsource":"MISC","url":"http://downloads.securityfocus.com/vulnerabilities/exploits/pacheckbook-1.1-mutlsql.txt"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-2209","datePublished":"2006-05-05T10:00:00.000Z","dateReserved":"2006-05-05T00:00:00.000Z","dateUpdated":"2024-08-07T17:43:28.478Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-05-05 12:46:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:php_arena:pacheckbook:1.1:*:*:*:*:*:*:*","matchCriteriaId":"5CD9F4D1-9A16-4B50-99E4-DCBE84D5E9F7"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"2209","Ordinal":"1","Title":"CVE-2006-2209","CVE":"CVE-2006-2209","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"2209","Ordinal":"1","NoteData":"Multiple SQL injection vulnerabilities in index.php in PHP Arena paCheckBook 1.1 allow remote attackers to execute arbitrary SQL commands via (1) the transtype parameter in an add action or (2) entry parameter in an edit action.  NOTE: the provenance of this information is unknown; the details are obtained from third party information.","Type":"Description","Title":"CVE-2006-2209"},{"CveYear":"2006","CveId":"2209","Ordinal":"2","NoteData":"2006-05-05","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"2209","Ordinal":"3","NoteData":"2017-07-19","Type":"Other","Title":"Modified"}]}}}