CVE-2011-1546 (GCVE-0-2011-1546)
Vulnerability from cvelistv5 – Published: 2011-04-01 21:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
Multiple SQL injection vulnerabilities in Andy's PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
Date Public ?
2011-03-16 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:28:41.754Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "17084",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "http://www.exploit-db.com/exploits/17084/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html"
},
{
"name": "ADV-2011-0802",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0802"
},
{
"name": "8168",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/8168"
},
{
"name": "34476",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34476"
},
{
"name": "aphpkb-aviewusers-sql-injection(66500)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66500"
},
{
"name": "8172",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/8172"
},
{
"name": "47097",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/47097"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.uncompiled.com/2011/03/cve-2011-1546/"
},
{
"name": "20110330 \u0027Andy\u0027s PHP Knowledgebase\u0027 SQL Injection Vulnerability (CVE-2011-1546)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/517261/100/0/threaded"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-03-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in Andy\u0027s PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php. NOTE: some of these details are obtained from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "17084",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "http://www.exploit-db.com/exploits/17084/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html"
},
{
"name": "ADV-2011-0802",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0802"
},
{
"name": "8168",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/8168"
},
{
"name": "34476",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34476"
},
{
"name": "aphpkb-aviewusers-sql-injection(66500)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66500"
},
{
"name": "8172",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/8172"
},
{
"name": "47097",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/47097"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.uncompiled.com/2011/03/cve-2011-1546/"
},
{
"name": "20110330 \u0027Andy\u0027s PHP Knowledgebase\u0027 SQL Injection Vulnerability (CVE-2011-1546)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/517261/100/0/threaded"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-1546",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple SQL injection vulnerabilities in Andy\u0027s PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php. NOTE: some of these details are obtained from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "17084",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/17084/"
},
{
"name": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html",
"refsource": "CONFIRM",
"url": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html"
},
{
"name": "ADV-2011-0802",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0802"
},
{
"name": "8168",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8168"
},
{
"name": "34476",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34476"
},
{
"name": "aphpkb-aviewusers-sql-injection(66500)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66500"
},
{
"name": "8172",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8172"
},
{
"name": "47097",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47097"
},
{
"name": "http://www.uncompiled.com/2011/03/cve-2011-1546/",
"refsource": "MISC",
"url": "http://www.uncompiled.com/2011/03/cve-2011-1546/"
},
{
"name": "20110330 \u0027Andy\u0027s PHP Knowledgebase\u0027 SQL Injection Vulnerability (CVE-2011-1546)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517261/100/0/threaded"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-1546",
"datePublished": "2011-04-01T21:00:00.000Z",
"dateReserved": "2011-03-29T00:00:00.000Z",
"dateUpdated": "2024-08-06T22:28:41.754Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2011-1546",
"date": "2026-04-25",
"epss": "0.01015",
"percentile": "0.7723"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"0.95.2\", \"matchCriteriaId\": \"1CB2B43E-EEDD-4909-A6E6-0F9EBB7E38DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DACF31C8-A603-4B79-8244-44256A13B176\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1D991B5-23FB-49F6-972E-404664609BE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4001AC64-B043-48FD-8D65-6D141CB80676\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B950680C-4443-4E46-921B-8D2FE1F90332\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DA27DBD-7E3A-462C-BDDD-4CD8D64DCCBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6905E49C-6CCF-4B10-9B97-4D8A0C0B8C1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B618ED0C-C9BA-481A-8FCD-9F86AC468109\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73587ED5-DC1F-4BCC-84C7-31CB69FAC2C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE2989E9-BD08-4806-8E8A-448F47C0655A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF18346E-D70E-4D12-9049-FC872F704779\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68BB8C62-97D7-4394-A1BB-C5AE8D3D5A37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48F23F23-DD31-4915-962D-C5CF691598E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D5A9ECD-265F-420C-A37D-9CA75FCE34D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A4E42EE-FDCC-4100-A112-1EB7FA87B402\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27E79D21-DF31-407A-B8F2-197F014938D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CA156DB-8D1B-43CB-AA59-D9FF25EA34E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"927848ED-EA16-491B-8044-DAE9399FBA85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CAF241E-5805-4824-A0FF-A786201B0B74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D530A024-7932-4E02-8073-8164BEE41EA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6D5B3B9-6CD9-46BA-B6ED-36682FA148C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E88FEF82-6EDB-446B-B3E8-4016C18F953E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC34DBD2-8122-4188-992C-CBA219747E6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"324B6D48-45E8-4913-95C5-EBFCEA402FBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"141A125D-76D1-4D07-8EDB-543B6A330A60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE4EE79E-D5F1-4F62-8904-01868C1D5922\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8174000-BFF2-4D4F-9679-D6CB03B23314\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD710E15-9FCB-4C82-B121-33EC130C4C43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C72CC0E-5E07-48BC-AD92-967DFB95E7A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE150FEE-7329-4658-A1CD-239972776FAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B073699-8E59-4D80-927E-9B43DCDA8A3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.64:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61699609-199D-40BB-A7BC-615C14B55969\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.65:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3E28C94-EE4D-43FD-A8B2-9F30193ED659\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.66:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48B46519-B5EE-4FE9-BCCF-85D071B2812E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.67:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C797E89D-3EC8-4597-A5C8-B53130355889\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.70:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37C6536F-BE6F-40DB-B86D-96512DB6CE41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.71:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC654D0E-D04E-4A3D-BE1D-7C3C68F9BED7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5827BF0E-365A-426F-A14C-2B6CC3BA8ECA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.73:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9B21A75-28D8-4A0B-8639-FF9F197E9995\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.74:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"952623F7-C9A0-4648-A043-E6528F48C639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7448CAF-E8D1-4502-84DE-CD9178D16C8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.76:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DBCD046-0C3C-4EB5-B878-7ADA97196313\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.77:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D13C315-FB13-4842-AAA3-DDF3DC0581ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.78:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A26285CD-2263-4E9D-A88E-6B9D8235E610\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.79:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"024BA0A7-C781-44AD-8EDA-64BE63D7B2E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.80:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"612A19BE-F5F6-4789-9837-366E776751CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.81:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA84AF45-FEF7-4784-A9E5-2511D19A8469\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.82:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AAD9BDD-F095-4547-B6B3-12BAC8919B98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.83:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B4702CE-F384-4D37-82DE-846746965EBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.84:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B36AD7C-9096-4CE9-AA1A-247D0DD50C79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.85:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67BD6319-B5B3-4EDE-B8F0-E62F0E9FF75B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.86:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D69CB4B-A218-4E80-BD65-B82BE6AF18E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.87:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"469AD7F4-AE3E-4296-82DA-9C14A4392EA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.88:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"033AC85B-BA0B-4F60-A350-B026F6F9B2E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.88.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C46C657E-83C7-403A-A18E-7092C8622441\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.88.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DCCEBB3-0B82-45D7-9CF4-3B28B35BD26F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.88.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CE62092-FB78-48E9-AFD0-0A6357308CFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.88.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6C46154-6375-41DB-B236-4BA648B9A4AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.89:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF5C28A8-D3DB-4207-8379-1E6C766313E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.91:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A074619-1D5A-4582-B78A-55E1DC089089\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.92:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A124428F-D906-4B5D-B327-51D8011FDFEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.92.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"288495C3-CAC3-4051-A8DA-A6A19349DBE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.92.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86673C5E-0472-4B75-83CF-D631C83EC8AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.92.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A96FE68-D848-4D19-95A8-2EDB417FF5FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.92.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F14D7547-FF87-47C0-AE31-5C2B8AD0E8F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.92.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5E566A8-1F07-4E2D-BD13-88850AA85B96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.92.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"489E0789-3EC9-4CEB-93E3-8892DABE51A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.92.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55740CB5-567C-4B4F-B237-CE23B1EE3368\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.92.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F380FB5-8A9C-42F3-8382-82FEFE99D910\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.92.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8907866F-CF5A-4369-A16B-E5FCAC9D3FB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.93.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8454A0DA-4483-4C27-98CF-F382E6D0891F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.93.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9E87F8E-E7CC-4394-BD6C-253CAED05284\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.93.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B990EB54-2655-43DF-87E8-0A3A16F58201\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.93.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00CD7B5D-A10B-4365-8669-5AC99C4A30E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.93.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"342A0AAF-699F-4B07-BBAC-20C04BE113CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.93.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BD63298-FE7F-412F-9600-6CF084B61FB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.93.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C86F258-FE02-4A09-A5A0-58FACF6F526A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.93.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"182F08F5-FBC9-4A84-A89A-AAFB686AF6AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.93.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AA2465E-8897-4102-A286-D6A29C117220\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.94.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB6D9132-22FA-46F4-9E1F-807409085ED0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.94.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8B9D0FB-0FA4-4AA6-B7E5-65FEC8CC1240\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.94.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E88DDA2C-5525-4588-A048-39E9763B5D9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.94.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FE11F06-3ADA-44B8-98E3-144357A14750\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.94.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECA084D7-AA57-46F9-9D38-E9C6DB33CD90\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.94.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29F7680A-44EB-44AD-82ED-6D1F9B9F2D41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.94.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45222B5E-E47D-44DA-8D54-8365E3D0C8C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.94.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FD29388-1729-4FC0-993A-72D140AD3E76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.94.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D846036E-4EBF-41BA-ACC7-AD7E7A8A5D73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.95:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D37D99B-E243-4BBB-8D38-E7D985320FAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.95.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"090B2050-6F6B-4DCB-9B5F-32E472802DDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.361:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0E7D66C-5D53-4D68-BD1E-A98B3FAA9CC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:aphpkb:aphpkb:0.371:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CE2842C-69B5-4795-BD5D-EBDF66D71405\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple SQL injection vulnerabilities in Andy\u0027s PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php. NOTE: some of these details are obtained from third party information.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades de inyecci\\u00f3n SQL en Andy\u0027s PHP Knowledgebase (Aphpkb) anterior a v0.95.3, permite a atacantes remotos ejecutar comandos SQL de su elecci\\u00f3n a trav\\u00e9s del par\\u00e1metro s para (1) a_viewusers.php o (2) keysearch.php; y permite a administradores autenticados remotamente ejecutar comandos SQl de su elecci\\u00f3n a trav\\u00e9s de (3) id o (4) el par\\u00e1metro start para pending.php, (5) el par\\u00e1metro aid para a_authordetails.php. Nota: algunos de estos detalles son obtenidos por terceras partes de informaci\\u00f3n.\"}]",
"id": "CVE-2011-1546",
"lastModified": "2024-11-21T01:26:33.670",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2011-04-04T12:27:38.280",
"references": "[{\"url\": \"http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/34476\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securityreason.com/securityalert/8168\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securityreason.com/securityalert/8172\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.exploit-db.com/exploits/17084/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/517261/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/47097\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.uncompiled.com/2011/03/cve-2011-1546/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0802\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/66500\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/34476\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securityreason.com/securityalert/8168\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securityreason.com/securityalert/8172\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.exploit-db.com/exploits/17084/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/517261/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/47097\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.uncompiled.com/2011/03/cve-2011-1546/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0802\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/66500\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-1546\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-04-04T12:27:38.280\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple SQL injection vulnerabilities in Andy\u0027s PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php. NOTE: some of these details are obtained from third party information.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Andy\u0027s PHP Knowledgebase (Aphpkb) anterior a v0.95.3, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro s para (1) a_viewusers.php o (2) keysearch.php; y permite a administradores autenticados remotamente ejecutar comandos SQl de su elecci\u00f3n a trav\u00e9s de (3) id o (4) el par\u00e1metro start para pending.php, (5) el par\u00e1metro aid para a_authordetails.php. Nota: algunos de estos detalles son obtenidos por terceras partes de informaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.95.2\",\"matchCriteriaId\":\"1CB2B43E-EEDD-4909-A6E6-0F9EBB7E38DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DACF31C8-A603-4B79-8244-44256A13B176\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D991B5-23FB-49F6-972E-404664609BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4001AC64-B043-48FD-8D65-6D141CB80676\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B950680C-4443-4E46-921B-8D2FE1F90332\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DA27DBD-7E3A-462C-BDDD-4CD8D64DCCBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6905E49C-6CCF-4B10-9B97-4D8A0C0B8C1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B618ED0C-C9BA-481A-8FCD-9F86AC468109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73587ED5-DC1F-4BCC-84C7-31CB69FAC2C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE2989E9-BD08-4806-8E8A-448F47C0655A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF18346E-D70E-4D12-9049-FC872F704779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68BB8C62-97D7-4394-A1BB-C5AE8D3D5A37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F23F23-DD31-4915-962D-C5CF691598E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D5A9ECD-265F-420C-A37D-9CA75FCE34D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A4E42EE-FDCC-4100-A112-1EB7FA87B402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E79D21-DF31-407A-B8F2-197F014938D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CA156DB-8D1B-43CB-AA59-D9FF25EA34E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"927848ED-EA16-491B-8044-DAE9399FBA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CAF241E-5805-4824-A0FF-A786201B0B74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D530A024-7932-4E02-8073-8164BEE41EA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6D5B3B9-6CD9-46BA-B6ED-36682FA148C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88FEF82-6EDB-446B-B3E8-4016C18F953E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC34DBD2-8122-4188-992C-CBA219747E6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"324B6D48-45E8-4913-95C5-EBFCEA402FBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"141A125D-76D1-4D07-8EDB-543B6A330A60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE4EE79E-D5F1-4F62-8904-01868C1D5922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8174000-BFF2-4D4F-9679-D6CB03B23314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD710E15-9FCB-4C82-B121-33EC130C4C43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C72CC0E-5E07-48BC-AD92-967DFB95E7A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE150FEE-7329-4658-A1CD-239972776FAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B073699-8E59-4D80-927E-9B43DCDA8A3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61699609-199D-40BB-A7BC-615C14B55969\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E28C94-EE4D-43FD-A8B2-9F30193ED659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.66:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48B46519-B5EE-4FE9-BCCF-85D071B2812E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.67:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C797E89D-3EC8-4597-A5C8-B53130355889\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37C6536F-BE6F-40DB-B86D-96512DB6CE41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC654D0E-D04E-4A3D-BE1D-7C3C68F9BED7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5827BF0E-365A-426F-A14C-2B6CC3BA8ECA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9B21A75-28D8-4A0B-8639-FF9F197E9995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952623F7-C9A0-4648-A043-E6528F48C639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7448CAF-E8D1-4502-84DE-CD9178D16C8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DBCD046-0C3C-4EB5-B878-7ADA97196313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D13C315-FB13-4842-AAA3-DDF3DC0581ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.78:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A26285CD-2263-4E9D-A88E-6B9D8235E610\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.79:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"024BA0A7-C781-44AD-8EDA-64BE63D7B2E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"612A19BE-F5F6-4789-9837-366E776751CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA84AF45-FEF7-4784-A9E5-2511D19A8469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AAD9BDD-F095-4547-B6B3-12BAC8919B98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B4702CE-F384-4D37-82DE-846746965EBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.84:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B36AD7C-9096-4CE9-AA1A-247D0DD50C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.85:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67BD6319-B5B3-4EDE-B8F0-E62F0E9FF75B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.86:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D69CB4B-A218-4E80-BD65-B82BE6AF18E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.87:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469AD7F4-AE3E-4296-82DA-9C14A4392EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.88:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"033AC85B-BA0B-4F60-A350-B026F6F9B2E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.88.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C46C657E-83C7-403A-A18E-7092C8622441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.88.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DCCEBB3-0B82-45D7-9CF4-3B28B35BD26F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.88.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE62092-FB78-48E9-AFD0-0A6357308CFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.88.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6C46154-6375-41DB-B236-4BA648B9A4AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.89:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF5C28A8-D3DB-4207-8379-1E6C766313E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A074619-1D5A-4582-B78A-55E1DC089089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A124428F-D906-4B5D-B327-51D8011FDFEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.92.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"288495C3-CAC3-4051-A8DA-A6A19349DBE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.92.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86673C5E-0472-4B75-83CF-D631C83EC8AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.92.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A96FE68-D848-4D19-95A8-2EDB417FF5FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.92.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14D7547-FF87-47C0-AE31-5C2B8AD0E8F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.92.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5E566A8-1F07-4E2D-BD13-88850AA85B96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.92.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"489E0789-3EC9-4CEB-93E3-8892DABE51A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.92.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55740CB5-567C-4B4F-B237-CE23B1EE3368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.92.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F380FB5-8A9C-42F3-8382-82FEFE99D910\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.92.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8907866F-CF5A-4369-A16B-E5FCAC9D3FB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.93.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8454A0DA-4483-4C27-98CF-F382E6D0891F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.93.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E87F8E-E7CC-4394-BD6C-253CAED05284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.93.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B990EB54-2655-43DF-87E8-0A3A16F58201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.93.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00CD7B5D-A10B-4365-8669-5AC99C4A30E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.93.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342A0AAF-699F-4B07-BBAC-20C04BE113CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.93.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BD63298-FE7F-412F-9600-6CF084B61FB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.93.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C86F258-FE02-4A09-A5A0-58FACF6F526A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.93.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"182F08F5-FBC9-4A84-A89A-AAFB686AF6AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.93.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AA2465E-8897-4102-A286-D6A29C117220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.94.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB6D9132-22FA-46F4-9E1F-807409085ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.94.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B9D0FB-0FA4-4AA6-B7E5-65FEC8CC1240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.94.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88DDA2C-5525-4588-A048-39E9763B5D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.94.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FE11F06-3ADA-44B8-98E3-144357A14750\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.94.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECA084D7-AA57-46F9-9D38-E9C6DB33CD90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.94.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29F7680A-44EB-44AD-82ED-6D1F9B9F2D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.94.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45222B5E-E47D-44DA-8D54-8365E3D0C8C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.94.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FD29388-1729-4FC0-993A-72D140AD3E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.94.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D846036E-4EBF-41BA-ACC7-AD7E7A8A5D73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D37D99B-E243-4BBB-8D38-E7D985320FAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.95.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090B2050-6F6B-4DCB-9B5F-32E472802DDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.361:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E7D66C-5D53-4D68-BD1E-A98B3FAA9CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aphpkb:aphpkb:0.371:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CE2842C-69B5-4795-BD5D-EBDF66D71405\"}]}]}],\"references\":[{\"url\":\"http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/34476\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/8168\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/8172\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.exploit-db.com/exploits/17084/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/517261/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/47097\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.uncompiled.com/2011/03/cve-2011-1546/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0802\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66500\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/34476\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/8168\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/8172\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.exploit-db.com/exploits/17084/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/517261/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/47097\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.uncompiled.com/2011/03/cve-2011-1546/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0802\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66500\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…