5
CVSSv2

CVE-2006-6924

Published: 13/01/2007 Updated: 29/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 520
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

bitweaver 1.3.1 and previous versions allows remote malicious users to obtain sensitive information via a sort_mode=-98 query string to (1) blogs/list_blogs.php, (2) fisheye/index.php, (3) wiki/orphan_pages.php, or (4) wiki/list_pages.php, which forces a SQL error. NOTE: the fisheye/list_galleries.php vector is already covered by CVE-2005-4380.

Vulnerable Product Search on Vulmon Subscribe to Product

bitweaver bitweaver 1.2.1

bitweaver bitweaver 1.3

bitweaver bitweaver 1.3.1

bitweaver bitweaver 1.1

bitweaver bitweaver 1.1.1_beta

Exploits

source: wwwsecurityfocuscom/bid/20996/info Bitweaver is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, ...
source: wwwsecurityfocuscom/bid/20996/info Bitweaver is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify d ...
source: wwwsecurityfocuscom/bid/20996/info Bitweaver is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modi ...
source: wwwsecurityfocuscom/bid/20996/info Bitweaver is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify ...