CVE-2005-3324

Appindex Mwchat - SQL Injection

Title source: rule
STIX 2.1

Description

SQL injection vulnerability in chat.php in MWChat 6.8 allows remote attackers to execute arbitrary SQL commands via the username parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by rgod · textwebappsphp
https://www.exploit-db.com/exploits/26394

References (9)

Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22845
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/15198
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2005/2180
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/20266
Exploit vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1015094
Exploit x_refsource_misc
http://rgod.altervista.org/mwchat.html
Patch third-party-advisory x_refsource_secunia
http://secunia.com/advisories/17303

Scores

EPSS 0.0166
EPSS Percentile 82.1%

Details

Status published
Products (1)
appindex/mwchat 6.8
Published Oct 27, 2005
Tracked Since Feb 18, 2026