source: http://www.securityfocus.com/bid/23057/info w-Agora is prone to multiple input-validation vulnerabilities, including possible SQL-injection issues and multiple cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation. w-Agora 4.2.1 is vulnerable. http://www.example.com/w-agora/profile.php?site=hello&showuser='"><script>alert(document.cookie)</script>
Related Exploits
Trying to match CVEs (1): CVE-2007-1606Trying to match OSVDBs (1): 34377
Other Possible E-DB Search Terms: W-Agora 4.2.1, W-Agora