CVE-2005-2896

WEB//NEWS 1.4 - SQL Injection

Title source: llm
STIX 2.1

Description

SQL injection vulnerability in WEB//NEWS 1.4 allows remote attackers to execute arbitrary SQL commands via the (1) wn_userpw parameter to startup.php, (2) cat, (3) id, or (4) stof parameter to news.php, or (5) id parameter to print.php.

Exploits (3)

exploitdb WRITEUP VERIFIED
by onkel_fisch · textwebappsphp
https://www.exploit-db.com/exploits/26234
exploitdb WRITEUP VERIFIED
by onkel_fisch · textwebappsphp
https://www.exploit-db.com/exploits/26236
exploitdb WRITEUP VERIFIED
by onkel_fisch · textwebappsphp
https://www.exploit-db.com/exploits/26235

References (4)

Core 4
Core References
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=112611504519410&w=2
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/16727/
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22179
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/14776

Scores

EPSS 0.0035
EPSS Percentile 57.5%

Details

Status published
Products (1)
stylemotion/web_news 1.4
Published Sep 14, 2005
Tracked Since Feb 18, 2026