Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

6 vulnerabilities by aphpkb

CVE-2013-7289 (GCVE-0-2013-7289)

Vulnerability from cvelistv5 – Published: 2014-01-10 16:00 – Updated: 2024-09-16 17:03
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in register.php in Andy's PHP Knowledgebase (Aphpkb) before 0.95.8 allow remote attackers to inject arbitrary web script or HTML via the (1) first_name, (2) last_name, (3) email, or (4) username parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://sourceforge.net/p/aphpkb/code/91 x_refsource_CONFIRM
http://aphpkb.blogspot.dk/2013/12/release-of-aphp… x_refsource_CONFIRM
http://secunia.com/advisories/56228 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/101466 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:01:20.289Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/p/aphpkb/code/91"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://aphpkb.blogspot.dk/2013/12/release-of-aphpkb-0958.html"
          },
          {
            "name": "56228",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56228"
          },
          {
            "name": "101466",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/101466"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in register.php in Andy\u0027s PHP Knowledgebase (Aphpkb) before 0.95.8 allow remote attackers to inject arbitrary web script or HTML via the (1) first_name, (2) last_name, (3) email, or (4) username parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-01-10T16:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/p/aphpkb/code/91"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://aphpkb.blogspot.dk/2013/12/release-of-aphpkb-0958.html"
        },
        {
          "name": "56228",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56228"
        },
        {
          "name": "101466",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/101466"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7289",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in register.php in Andy\u0027s PHP Knowledgebase (Aphpkb) before 0.95.8 allow remote attackers to inject arbitrary web script or HTML via the (1) first_name, (2) last_name, (3) email, or (4) username parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://sourceforge.net/p/aphpkb/code/91",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/p/aphpkb/code/91"
            },
            {
              "name": "http://aphpkb.blogspot.dk/2013/12/release-of-aphpkb-0958.html",
              "refsource": "CONFIRM",
              "url": "http://aphpkb.blogspot.dk/2013/12/release-of-aphpkb-0958.html"
            },
            {
              "name": "56228",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56228"
            },
            {
              "name": "101466",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/101466"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7289",
    "datePublished": "2014-01-10T16:00:00.000Z",
    "dateReserved": "2014-01-10T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:03:40.553Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-7277 (GCVE-0-2013-7277)

Vulnerability from cvelistv5 – Published: 2014-01-08 15:00 – Updated: 2024-08-06 18:01
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Andy's PHP Knowledgebase (Aphpkb) before 0.95.8 allow remote attackers to inject arbitrary web script or HTML via the (1) HTTP Referer header to saa.php, (2) username parameter to login.php, or (3) keyword_list parameter to keysearch.php.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/64550 vdb-entryx_refsource_BID
http://osvdb.org/101492 vdb-entryx_refsource_OSVDB
https://www.netsparker.com/critical-xss-vulnerabi… x_refsource_MISC
http://sourceforge.net/p/aphpkb/code/91 x_refsource_CONFIRM
http://aphpkb.blogspot.dk/2013/12/release-of-aphp… x_refsource_CONFIRM
http://osvdb.org/101467 vdb-entryx_refsource_OSVDB
http://osvdb.org/101491 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/56228 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2013-12-24 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:01:20.387Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "64550",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/64550"
          },
          {
            "name": "101492",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/101492"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.netsparker.com/critical-xss-vulnerabilities-andy-php-knowledgebase"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/p/aphpkb/code/91"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://aphpkb.blogspot.dk/2013/12/release-of-aphpkb-0958.html"
          },
          {
            "name": "101467",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/101467"
          },
          {
            "name": "101491",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/101491"
          },
          {
            "name": "56228",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56228"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-24T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in Andy\u0027s PHP Knowledgebase (Aphpkb) before 0.95.8 allow remote attackers to inject arbitrary web script or HTML via the (1) HTTP Referer header to saa.php, (2) username parameter to login.php, or (3) keyword_list parameter to keysearch.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "64550",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/64550"
        },
        {
          "name": "101492",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/101492"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.netsparker.com/critical-xss-vulnerabilities-andy-php-knowledgebase"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/p/aphpkb/code/91"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://aphpkb.blogspot.dk/2013/12/release-of-aphpkb-0958.html"
        },
        {
          "name": "101467",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/101467"
        },
        {
          "name": "101491",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/101491"
        },
        {
          "name": "56228",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56228"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7277",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in Andy\u0027s PHP Knowledgebase (Aphpkb) before 0.95.8 allow remote attackers to inject arbitrary web script or HTML via the (1) HTTP Referer header to saa.php, (2) username parameter to login.php, or (3) keyword_list parameter to keysearch.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "64550",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/64550"
            },
            {
              "name": "101492",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/101492"
            },
            {
              "name": "https://www.netsparker.com/critical-xss-vulnerabilities-andy-php-knowledgebase",
              "refsource": "MISC",
              "url": "https://www.netsparker.com/critical-xss-vulnerabilities-andy-php-knowledgebase"
            },
            {
              "name": "http://sourceforge.net/p/aphpkb/code/91",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/p/aphpkb/code/91"
            },
            {
              "name": "http://aphpkb.blogspot.dk/2013/12/release-of-aphpkb-0958.html",
              "refsource": "CONFIRM",
              "url": "http://aphpkb.blogspot.dk/2013/12/release-of-aphpkb-0958.html"
            },
            {
              "name": "101467",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/101467"
            },
            {
              "name": "101491",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/101491"
            },
            {
              "name": "56228",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56228"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7277",
    "datePublished": "2014-01-08T15:00:00.000Z",
    "dateReserved": "2014-01-08T00:00:00.000Z",
    "dateUpdated": "2024-08-06T18:01:20.387Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1546 (GCVE-0-2011-1546)

Vulnerability from cvelistv5 – Published: 2011-04-01 21:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
Multiple SQL injection vulnerabilities in Andy's PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.exploit-db.com/exploits/17084/ exploitx_refsource_EXPLOIT-DB
http://aphpkb.blogspot.com/2011/03/this-release-i… x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0802 vdb-entryx_refsource_VUPEN
http://securityreason.com/securityalert/8168 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/34476 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://securityreason.com/securityalert/8172 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/bid/47097 vdb-entryx_refsource_BID
http://www.uncompiled.com/2011/03/cve-2011-1546/ x_refsource_MISC
http://www.securityfocus.com/archive/1/517261/100… mailing-listx_refsource_BUGTRAQ
Date Public ?
2011-03-16 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.754Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17084",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/17084/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html"
          },
          {
            "name": "ADV-2011-0802",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0802"
          },
          {
            "name": "8168",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8168"
          },
          {
            "name": "34476",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34476"
          },
          {
            "name": "aphpkb-aviewusers-sql-injection(66500)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66500"
          },
          {
            "name": "8172",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8172"
          },
          {
            "name": "47097",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47097"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.uncompiled.com/2011/03/cve-2011-1546/"
          },
          {
            "name": "20110330 \u0027Andy\u0027s PHP Knowledgebase\u0027 SQL Injection Vulnerability (CVE-2011-1546)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/517261/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-16T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in Andy\u0027s PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17084",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/17084/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html"
        },
        {
          "name": "ADV-2011-0802",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0802"
        },
        {
          "name": "8168",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8168"
        },
        {
          "name": "34476",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34476"
        },
        {
          "name": "aphpkb-aviewusers-sql-injection(66500)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66500"
        },
        {
          "name": "8172",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8172"
        },
        {
          "name": "47097",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47097"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.uncompiled.com/2011/03/cve-2011-1546/"
        },
        {
          "name": "20110330 \u0027Andy\u0027s PHP Knowledgebase\u0027 SQL Injection Vulnerability (CVE-2011-1546)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/517261/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1546",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple SQL injection vulnerabilities in Andy\u0027s PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17084",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/17084/"
            },
            {
              "name": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html",
              "refsource": "CONFIRM",
              "url": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html"
            },
            {
              "name": "ADV-2011-0802",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0802"
            },
            {
              "name": "8168",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/8168"
            },
            {
              "name": "34476",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34476"
            },
            {
              "name": "aphpkb-aviewusers-sql-injection(66500)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66500"
            },
            {
              "name": "8172",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/8172"
            },
            {
              "name": "47097",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47097"
            },
            {
              "name": "http://www.uncompiled.com/2011/03/cve-2011-1546/",
              "refsource": "MISC",
              "url": "http://www.uncompiled.com/2011/03/cve-2011-1546/"
            },
            {
              "name": "20110330 \u0027Andy\u0027s PHP Knowledgebase\u0027 SQL Injection Vulnerability (CVE-2011-1546)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/517261/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1546",
    "datePublished": "2011-04-01T21:00:00.000Z",
    "dateReserved": "2011-03-29T00:00:00.000Z",
    "dateUpdated": "2024-08-06T22:28:41.754Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1555 (GCVE-0-2011-1555)

Vulnerability from cvelistv5 – Published: 2011-04-01 21:00 – Updated: 2024-09-16 18:43
VLAI?
Summary
SQL injection vulnerability in saa.php in Andy's PHP Knowledgebase (Aphpkb) 0.95.3 and earlier allows remote attackers to execute arbitrary SQL commands via the aid parameter, a different vulnerability than CVE-2011-1546. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://aphpkb.blogspot.com/2011/03/this-release-i… x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0802 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/34476 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.868Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html"
          },
          {
            "name": "ADV-2011-0802",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0802"
          },
          {
            "name": "34476",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34476"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in saa.php in Andy\u0027s PHP Knowledgebase (Aphpkb) 0.95.3 and earlier allows remote attackers to execute arbitrary SQL commands via the aid parameter, a different vulnerability than CVE-2011-1546.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-01T21:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html"
        },
        {
          "name": "ADV-2011-0802",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0802"
        },
        {
          "name": "34476",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34476"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1555",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in saa.php in Andy\u0027s PHP Knowledgebase (Aphpkb) 0.95.3 and earlier allows remote attackers to execute arbitrary SQL commands via the aid parameter, a different vulnerability than CVE-2011-1546.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html",
              "refsource": "CONFIRM",
              "url": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html"
            },
            {
              "name": "ADV-2011-0802",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0802"
            },
            {
              "name": "34476",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34476"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1555",
    "datePublished": "2011-04-01T21:00:00.000Z",
    "dateReserved": "2011-04-01T00:00:00.000Z",
    "dateUpdated": "2024-09-16T18:43:32.408Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1556 (GCVE-0-2011-1556)

Vulnerability from cvelistv5 – Published: 2011-04-01 21:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
SQL injection vulnerability in plugins/pdfClasses/pdfgen.php in Andy's PHP Knowledgebase (Aphpkb) 0.95.4 allows remote attackers to execute arbitrary SQL commands via the pdfa parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/71287 vdb-entryx_refsource_OSVDB
http://www.autosectools.com/Advisories/Andy%27s.P… x_refsource_MISC
http://www.vupen.com/english/advisories/2011/0823 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/43879 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.exploit-db.com/exploits/17061/ exploitx_refsource_EXPLOIT-DB
Date Public ?
2011-03-27 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.849Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "71287",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/71287"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.autosectools.com/Advisories/Andy%27s.PHP.Knowledgebase.Project.0.95.4_SQL.Injection_161.html"
          },
          {
            "name": "ADV-2011-0823",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0823"
          },
          {
            "name": "43879",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43879"
          },
          {
            "name": "phpknowledgebase-pdfgen-sql-injection(66386)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66386"
          },
          {
            "name": "17061",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/17061/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-27T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in plugins/pdfClasses/pdfgen.php in Andy\u0027s PHP Knowledgebase (Aphpkb) 0.95.4 allows remote attackers to execute arbitrary SQL commands via the pdfa parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "71287",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/71287"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.autosectools.com/Advisories/Andy%27s.PHP.Knowledgebase.Project.0.95.4_SQL.Injection_161.html"
        },
        {
          "name": "ADV-2011-0823",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0823"
        },
        {
          "name": "43879",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43879"
        },
        {
          "name": "phpknowledgebase-pdfgen-sql-injection(66386)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66386"
        },
        {
          "name": "17061",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/17061/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1556",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in plugins/pdfClasses/pdfgen.php in Andy\u0027s PHP Knowledgebase (Aphpkb) 0.95.4 allows remote attackers to execute arbitrary SQL commands via the pdfa parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "71287",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/71287"
            },
            {
              "name": "http://www.autosectools.com/Advisories/Andy%27s.PHP.Knowledgebase.Project.0.95.4_SQL.Injection_161.html",
              "refsource": "MISC",
              "url": "http://www.autosectools.com/Advisories/Andy%27s.PHP.Knowledgebase.Project.0.95.4_SQL.Injection_161.html"
            },
            {
              "name": "ADV-2011-0823",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0823"
            },
            {
              "name": "43879",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43879"
            },
            {
              "name": "phpknowledgebase-pdfgen-sql-injection(66386)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66386"
            },
            {
              "name": "17061",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/17061/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1556",
    "datePublished": "2011-04-01T21:00:00.000Z",
    "dateReserved": "2011-04-01T00:00:00.000Z",
    "dateUpdated": "2024-08-06T22:28:41.849Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-6513 (GCVE-0-2008-6513)

Vulnerability from cvelistv5 – Published: 2009-03-24 14:00 – Updated: 2024-08-07 11:34
VLAI?
Summary
Unrestricted file upload vulnerability in saa.php in Andy's PHP Knowledgebase (aphpkb) 0.92.9 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a link that is listed by authors.php.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://sourceforge.net/project/shownotes.php?grou… x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/34476 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/32559 vdb-entryx_refsource_BID
https://www.exploit-db.com/exploits/7312 exploitx_refsource_EXPLOIT-DB
Date Public ?
2008-12-01 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:34:46.397Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?group_id=113755\u0026release_id=667918"
          },
          {
            "name": "andysphpknowledgebase-saa-file-upload(46977)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46977"
          },
          {
            "name": "34476",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34476"
          },
          {
            "name": "32559",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32559"
          },
          {
            "name": "7312",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/7312"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-01T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unrestricted file upload vulnerability in saa.php in Andy\u0027s PHP Knowledgebase (aphpkb) 0.92.9 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a link that is listed by authors.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?group_id=113755\u0026release_id=667918"
        },
        {
          "name": "andysphpknowledgebase-saa-file-upload(46977)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46977"
        },
        {
          "name": "34476",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34476"
        },
        {
          "name": "32559",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32559"
        },
        {
          "name": "7312",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/7312"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-6513",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unrestricted file upload vulnerability in saa.php in Andy\u0027s PHP Knowledgebase (aphpkb) 0.92.9 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a link that is listed by authors.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://sourceforge.net/project/shownotes.php?group_id=113755\u0026release_id=667918",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?group_id=113755\u0026release_id=667918"
            },
            {
              "name": "andysphpknowledgebase-saa-file-upload(46977)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46977"
            },
            {
              "name": "34476",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34476"
            },
            {
              "name": "32559",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32559"
            },
            {
              "name": "7312",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/7312"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-6513",
    "datePublished": "2009-03-24T14:00:00.000Z",
    "dateReserved": "2009-03-24T00:00:00.000Z",
    "dateUpdated": "2024-08-07T11:34:46.397Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}