Description
SQL injection vulnerability in chat.php in MWChat 6.8 allows remote attackers to execute arbitrary SQL commands via the username parameter.
Exploits (1)
References (9)
Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22845
Various Sources x_refsource_confirm
http://appindex.net/products/changelog/?product=mwchat&version=6.9
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15198
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2005/2180
Various Sources x_refsource_misc
http://www.hackerscenter.com/Archive/view.asp?id=19537
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/20266
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1015094
Exploit x_refsource_misc
http://rgod.altervista.org/mwchat.html
Patch third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17303
Scores
EPSS
0.0166
EPSS Percentile
82.1%
Details
Status
published
Products (1)
appindex/mwchat
6.8
Published
Oct 27, 2005
Tracked Since
Feb 18, 2026