CVE-2007-4920

SQL injection vulnerability in soporte_derecha_w.php in PHP Webquest 2.5 and earlier allows remote attackers to execute arbitrary SQL commands via the id_actividad parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:php_webquest:php_webquest:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:36

Type Values Removed Values Added
References () http://secunia.com/advisories/26821 - () http://secunia.com/advisories/26821 -
References () http://www.osvdb.org/37084 - () http://www.osvdb.org/37084 -
References () http://www.securityfocus.com/bid/25668 - Exploit () http://www.securityfocus.com/bid/25668 - Exploit
References () http://www.vupen.com/english/advisories/2007/3177 - () http://www.vupen.com/english/advisories/2007/3177 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36605 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/36605 -
References () https://www.exploit-db.com/exploits/4407 - () https://www.exploit-db.com/exploits/4407 -

Information

Published : 2007-09-17 17:17

Updated : 2024-11-21 00:36


NVD link : CVE-2007-4920

Mitre link : CVE-2007-4920

CVE.ORG link : CVE-2007-4920


JSON object : View

Products Affected

php_webquest

  • php_webquest
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')