CVE-2011-1546

CVSS V2 High 7.5 CVSS V3 None
Description
Multiple SQL injection vulnerabilities in Andy's PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php. NOTE: some of these details are obtained from third party information.
Overview
  • CVE ID
  • CVE-2011-1546
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2011-04-04T12:27:38
  • Last Modified Date
  • 2018-10-09T19:31:12
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:aphpkb:aphpkb:*:*:*:*:*:*:*:* 1 OR 0.95.2
cpe:2.3:a:aphpkb:aphpkb:0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.33:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.35:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.38:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.39:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.41:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.42:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.43:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.44:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.45:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.51:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.52:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.53:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.54:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.55:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.56:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.57:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.58:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.59:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.61:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.62:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.63:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.64:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.65:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.66:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.67:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.70:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.71:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.72:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.73:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.74:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.75:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.76:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.77:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.78:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.79:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.80:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.81:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.82:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.83:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.84:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.85:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.86:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.87:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.88:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.88.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.88.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.88.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.88.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.89:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.91:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.92:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.92.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.92.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.92.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.92.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.92.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.92.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.92.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.92.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.92.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.93.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.93.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.93.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.93.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.93.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.93.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.93.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.93.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.93.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.94.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.94.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.94.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.94.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.94.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.94.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.94.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.94.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.94.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.95:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.95.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.361:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:aphpkb:aphpkb:0.371:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
History
Created Old Value New Value Data Type Notes
2022-05-10 18:35:51 Added to TrackCVE