6.4
CVSSv2

CVE-2005-0475

Published: 30/03/2005 Updated: 11/07/2017
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 660
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

SQL injection vulnerability in paFAQ Beta4, and possibly other versions, allows remote malicious users to execute arbitrary SQL code via the (1) offset, (2) limit, (3) order, or (4) orderby parameter to question.php, (5) offset parameter to answer.php, (6) search_item parameter to search.php, (7) cat_id, (8) cid, or (9) id parameter to comment.php.

Vulnerable Product Search on Vulmon Subscribe to Product

php arena pafaq beta4

Exploits

source: wwwsecurityfocuscom/bid/12582/info paFaq is reportedly affected by an SQL injection vulnerability This issue exists because the application fails to properly sanitize user-supplied input before using it in SQL queries Successful exploitation could result in a compromise of the application, disclosure or modification of data, ...
source: wwwsecurityfocuscom/bid/12582/info paFaq is reportedly affected by an SQL injection vulnerability This issue exists because the application fails to properly sanitize user-supplied input before using it in SQL queries Successful exploitation could result in a compromise of the application, disclosure or modification of data ...
source: wwwsecurityfocuscom/bid/12582/info paFaq is reportedly affected by an SQL injection vulnerability This issue exists because the application fails to properly sanitize user-supplied input before using it in SQL queries Successful exploitation could result in a compromise of the application, disclosure or modification of data, or ...
source: wwwsecurityfocuscom/bid/12582/info paFaq is reportedly affected by an SQL injection vulnerability This issue exists because the application fails to properly sanitize user-supplied input before using it in SQL queries Successful exploitation could result in a compromise of the application, disclosure or modification of data, ...