Multiple SQL injection vulnerabilities in KwsPHP 1.0 allow remote attackers to execute arbitrary SQL commands via (1) the pseudo parameter to login.php, (2) the id parameter to index.php in a carnet editer action in the Member_Space (espace_membre) module, or (3) the typenav parameter to index.php in a browser aff action in the stats module.
References
Configurations
History
21 Nov 2024, 00:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://koogar.alorys-hebergement.com/kwsphp/index.php?mod=news&ac=commentaires&id=29 - | |
References | () http://osvdb.org/37180 - | |
References | () http://osvdb.org/37182 - | |
References | () http://secunia.com/advisories/26850 - | |
References | () http://www.securityfocus.com/bid/25679 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36634 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36635 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36636 - | |
References | () https://www.exploit-db.com/exploits/4412 - | |
References | () https://www.exploit-db.com/exploits/4413 - | |
References | () https://www.exploit-db.com/exploits/4414 - |
Information
Published : 2007-09-18 20:17
Updated : 2024-11-21 00:36
NVD link : CVE-2007-4956
Mitre link : CVE-2007-4956
CVE.ORG link : CVE-2007-4956
JSON object : View
Products Affected
kwsphp
- kwsphp
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')