CVE-2007-3534

Daniel Toma Webchat - SQL Injection

Title source: rule
STIX 2.1

Description

SQL injection vulnerability in login.php in WebChat 0.78 allows remote attackers to execute arbitrary SQL commands via the rid parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by r00t · textwebappsphp
https://www.exploit-db.com/exploits/4125

References (5)

Core 5
Core References
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/25892
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/4125
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/24701
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/35161
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/36295

Scores

EPSS 0.0069
EPSS Percentile 71.9%

Details

Status published
Products (1)
daniel_toma/webchat 0.78
Published Jul 03, 2007
Tracked Since Feb 18, 2026