SQL injection vulnerability in PHPKit 1.6.1 RC2 allows remote attackers to inject arbitrary SQL commands via the catid parameter to include.php when the path parameter is set to faq/faq.php, and other unspecified vectors involving guestbook/print.php.
References
Configurations
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/17479 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/2357 - | |
References | () http://www.bb-pcsecurity.de/websecurity/532/org/PHPKit_1.6.1_RC2_%28faq-faq.php%29_Remote_SQL_Injection_Exploit.htm - | |
References | () http://www.osvdb.org/31265 - | |
References | () http://www.securityfocus.com/archive/1/451304/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21002 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30209 - |
07 Nov 2023, 01:59
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2007-03-06 01:19
Updated : 2024-11-21 00:24
NVD link : CVE-2006-7115
Mitre link : CVE-2006-7115
CVE.ORG link : CVE-2006-7115
JSON object : View
Products Affected
phpkit
- phpkit
CWE