SQL injection vulnerability in functions/functions_filters.asp in Web Wiz Forums before 8.05a (MySQL version) does not properly filter certain characters in SQL commands, which allows remote attackers to execute arbitrary SQL commands via "’ (backslash double-quote quote) sequences, which are collapsed into '', as demonstrated via the name parameter to forum/pop_up_member_search.asp.
ifsec.blogspot.com/2007/03/web-wiz-forums-805-mysql-version-sql.html
osvdb.org/34344
secunia.com/advisories/24561
securityreason.com/securityalert/2456
www.securityfocus.com/archive/1/463287/100/0/threaded
www.securityfocus.com/bid/23051
www.vupen.com/english/advisories/2007/1061
www.webwizguide.info/web_wiz_forums/Version%20History.txt
exchange.xforce.ibmcloud.com/vulnerabilities/33095