Description
SQL injection vulnerability in WEB//NEWS 1.4 allows remote attackers to execute arbitrary SQL commands via the (1) wn_userpw parameter to startup.php, (2) cat, (3) id, or (4) stof parameter to news.php, or (5) id parameter to print.php.
Exploits (3)
exploitdb
WRITEUP
VERIFIED
by onkel_fisch · textwebappsphp
https://www.exploit-db.com/exploits/26234
exploitdb
WRITEUP
VERIFIED
by onkel_fisch · textwebappsphp
https://www.exploit-db.com/exploits/26236
exploitdb
WRITEUP
VERIFIED
by onkel_fisch · textwebappsphp
https://www.exploit-db.com/exploits/26235
References (4)
Core 4
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=112611504519410&w=2
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/16727/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22179
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/14776
Scores
EPSS
0.0035
EPSS Percentile
57.5%
Details
Status
published
Products (1)
stylemotion/web_news
1.4
Published
Sep 14, 2005
Tracked Since
Feb 18, 2026