search.php in w-Agora (Web-Agora) allows remote attackers to obtain potentially sensitive information via a ' (quote) value followed by certain SQL sequences in the (1) search_forum or (2) search_user parameter, which force a SQL error.
References
Configurations
History
21 Nov 2024, 00:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/34376 - | |
References | () http://secunia.com/advisories/24605 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/2462 - | |
References | () http://www.securityfocus.com/archive/1/463286/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/23057 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33177 - |
Information
Published : 2007-03-22 23:19
Updated : 2024-11-21 00:28
NVD link : CVE-2007-1607
Mitre link : CVE-2007-1607
CVE.ORG link : CVE-2007-1607
JSON object : View
Products Affected
w-agora
- w-agora
CWE