FKIE_CVE-2011-1546
Vulnerability from fkie_nvd - Published: 2011-04-04 12:27 - Updated: 2026-04-29 01:13
Severity ?
Summary
Multiple SQL injection vulnerabilities in Andy's PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php. NOTE: some of these details are obtained from third party information.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CB2B43E-EEDD-4909-A6E6-0F9EBB7E38DD",
"versionEndIncluding": "0.95.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DACF31C8-A603-4B79-8244-44256A13B176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D991B5-23FB-49F6-972E-404664609BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4001AC64-B043-48FD-8D65-6D141CB80676",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B950680C-4443-4E46-921B-8D2FE1F90332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA27DBD-7E3A-462C-BDDD-4CD8D64DCCBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6905E49C-6CCF-4B10-9B97-4D8A0C0B8C1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B618ED0C-C9BA-481A-8FCD-9F86AC468109",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "73587ED5-DC1F-4BCC-84C7-31CB69FAC2C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "BE2989E9-BD08-4806-8E8A-448F47C0655A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "CF18346E-D70E-4D12-9049-FC872F704779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "68BB8C62-97D7-4394-A1BB-C5AE8D3D5A37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "48F23F23-DD31-4915-962D-C5CF691598E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.39:*:*:*:*:*:*:*",
"matchCriteriaId": "3D5A9ECD-265F-420C-A37D-9CA75FCE34D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "7A4E42EE-FDCC-4100-A112-1EB7FA87B402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "27E79D21-DF31-407A-B8F2-197F014938D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.43:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA156DB-8D1B-43CB-AA59-D9FF25EA34E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.44:*:*:*:*:*:*:*",
"matchCriteriaId": "927848ED-EA16-491B-8044-DAE9399FBA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.45:*:*:*:*:*:*:*",
"matchCriteriaId": "8CAF241E-5805-4824-A0FF-A786201B0B74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.51:*:*:*:*:*:*:*",
"matchCriteriaId": "D530A024-7932-4E02-8073-8164BEE41EA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.52:*:*:*:*:*:*:*",
"matchCriteriaId": "F6D5B3B9-6CD9-46BA-B6ED-36682FA148C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.53:*:*:*:*:*:*:*",
"matchCriteriaId": "E88FEF82-6EDB-446B-B3E8-4016C18F953E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.54:*:*:*:*:*:*:*",
"matchCriteriaId": "BC34DBD2-8122-4188-992C-CBA219747E6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.55:*:*:*:*:*:*:*",
"matchCriteriaId": "324B6D48-45E8-4913-95C5-EBFCEA402FBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.56:*:*:*:*:*:*:*",
"matchCriteriaId": "141A125D-76D1-4D07-8EDB-543B6A330A60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.57:*:*:*:*:*:*:*",
"matchCriteriaId": "EE4EE79E-D5F1-4F62-8904-01868C1D5922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.58:*:*:*:*:*:*:*",
"matchCriteriaId": "C8174000-BFF2-4D4F-9679-D6CB03B23314",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.59:*:*:*:*:*:*:*",
"matchCriteriaId": "FD710E15-9FCB-4C82-B121-33EC130C4C43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.61:*:*:*:*:*:*:*",
"matchCriteriaId": "0C72CC0E-5E07-48BC-AD92-967DFB95E7A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.62:*:*:*:*:*:*:*",
"matchCriteriaId": "EE150FEE-7329-4658-A1CD-239972776FAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.63:*:*:*:*:*:*:*",
"matchCriteriaId": "7B073699-8E59-4D80-927E-9B43DCDA8A3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.64:*:*:*:*:*:*:*",
"matchCriteriaId": "61699609-199D-40BB-A7BC-615C14B55969",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.65:*:*:*:*:*:*:*",
"matchCriteriaId": "C3E28C94-EE4D-43FD-A8B2-9F30193ED659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.66:*:*:*:*:*:*:*",
"matchCriteriaId": "48B46519-B5EE-4FE9-BCCF-85D071B2812E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.67:*:*:*:*:*:*:*",
"matchCriteriaId": "C797E89D-3EC8-4597-A5C8-B53130355889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.70:*:*:*:*:*:*:*",
"matchCriteriaId": "37C6536F-BE6F-40DB-B86D-96512DB6CE41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.71:*:*:*:*:*:*:*",
"matchCriteriaId": "DC654D0E-D04E-4A3D-BE1D-7C3C68F9BED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.72:*:*:*:*:*:*:*",
"matchCriteriaId": "5827BF0E-365A-426F-A14C-2B6CC3BA8ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.73:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B21A75-28D8-4A0B-8639-FF9F197E9995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.74:*:*:*:*:*:*:*",
"matchCriteriaId": "952623F7-C9A0-4648-A043-E6528F48C639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.75:*:*:*:*:*:*:*",
"matchCriteriaId": "E7448CAF-E8D1-4502-84DE-CD9178D16C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.76:*:*:*:*:*:*:*",
"matchCriteriaId": "5DBCD046-0C3C-4EB5-B878-7ADA97196313",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.77:*:*:*:*:*:*:*",
"matchCriteriaId": "0D13C315-FB13-4842-AAA3-DDF3DC0581ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.78:*:*:*:*:*:*:*",
"matchCriteriaId": "A26285CD-2263-4E9D-A88E-6B9D8235E610",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.79:*:*:*:*:*:*:*",
"matchCriteriaId": "024BA0A7-C781-44AD-8EDA-64BE63D7B2E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.80:*:*:*:*:*:*:*",
"matchCriteriaId": "612A19BE-F5F6-4789-9837-366E776751CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.81:*:*:*:*:*:*:*",
"matchCriteriaId": "BA84AF45-FEF7-4784-A9E5-2511D19A8469",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.82:*:*:*:*:*:*:*",
"matchCriteriaId": "4AAD9BDD-F095-4547-B6B3-12BAC8919B98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.83:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4702CE-F384-4D37-82DE-846746965EBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.84:*:*:*:*:*:*:*",
"matchCriteriaId": "8B36AD7C-9096-4CE9-AA1A-247D0DD50C79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.85:*:*:*:*:*:*:*",
"matchCriteriaId": "67BD6319-B5B3-4EDE-B8F0-E62F0E9FF75B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.86:*:*:*:*:*:*:*",
"matchCriteriaId": "6D69CB4B-A218-4E80-BD65-B82BE6AF18E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.87:*:*:*:*:*:*:*",
"matchCriteriaId": "469AD7F4-AE3E-4296-82DA-9C14A4392EA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.88:*:*:*:*:*:*:*",
"matchCriteriaId": "033AC85B-BA0B-4F60-A350-B026F6F9B2E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.88.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C46C657E-83C7-403A-A18E-7092C8622441",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.88.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6DCCEBB3-0B82-45D7-9CF4-3B28B35BD26F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.88.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE62092-FB78-48E9-AFD0-0A6357308CFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.88.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B6C46154-6375-41DB-B236-4BA648B9A4AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.89:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5C28A8-D3DB-4207-8379-1E6C766313E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.91:*:*:*:*:*:*:*",
"matchCriteriaId": "2A074619-1D5A-4582-B78A-55E1DC089089",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.92:*:*:*:*:*:*:*",
"matchCriteriaId": "A124428F-D906-4B5D-B327-51D8011FDFEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.92.1:*:*:*:*:*:*:*",
"matchCriteriaId": "288495C3-CAC3-4051-A8DA-A6A19349DBE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.92.2:*:*:*:*:*:*:*",
"matchCriteriaId": "86673C5E-0472-4B75-83CF-D631C83EC8AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.92.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3A96FE68-D848-4D19-95A8-2EDB417FF5FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.92.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D7547-FF87-47C0-AE31-5C2B8AD0E8F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.92.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B5E566A8-1F07-4E2D-BD13-88850AA85B96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.92.6:*:*:*:*:*:*:*",
"matchCriteriaId": "489E0789-3EC9-4CEB-93E3-8892DABE51A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.92.7:*:*:*:*:*:*:*",
"matchCriteriaId": "55740CB5-567C-4B4F-B237-CE23B1EE3368",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.92.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7F380FB5-8A9C-42F3-8382-82FEFE99D910",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.92.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8907866F-CF5A-4369-A16B-E5FCAC9D3FB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.93.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8454A0DA-4483-4C27-98CF-F382E6D0891F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.93.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9E87F8E-E7CC-4394-BD6C-253CAED05284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.93.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B990EB54-2655-43DF-87E8-0A3A16F58201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.93.4:*:*:*:*:*:*:*",
"matchCriteriaId": "00CD7B5D-A10B-4365-8669-5AC99C4A30E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.93.5:*:*:*:*:*:*:*",
"matchCriteriaId": "342A0AAF-699F-4B07-BBAC-20C04BE113CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.93.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD63298-FE7F-412F-9600-6CF084B61FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.93.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0C86F258-FE02-4A09-A5A0-58FACF6F526A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.93.8:*:*:*:*:*:*:*",
"matchCriteriaId": "182F08F5-FBC9-4A84-A89A-AAFB686AF6AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.93.9:*:*:*:*:*:*:*",
"matchCriteriaId": "3AA2465E-8897-4102-A286-D6A29C117220",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.94.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6D9132-22FA-46F4-9E1F-807409085ED0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.94.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9D0FB-0FA4-4AA6-B7E5-65FEC8CC1240",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.94.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E88DDA2C-5525-4588-A048-39E9763B5D9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.94.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE11F06-3ADA-44B8-98E3-144357A14750",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.94.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA084D7-AA57-46F9-9D38-E9C6DB33CD90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.94.6:*:*:*:*:*:*:*",
"matchCriteriaId": "29F7680A-44EB-44AD-82ED-6D1F9B9F2D41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.94.7:*:*:*:*:*:*:*",
"matchCriteriaId": "45222B5E-E47D-44DA-8D54-8365E3D0C8C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.94.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD29388-1729-4FC0-993A-72D140AD3E76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.94.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D846036E-4EBF-41BA-ACC7-AD7E7A8A5D73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.95:*:*:*:*:*:*:*",
"matchCriteriaId": "0D37D99B-E243-4BBB-8D38-E7D985320FAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.95.1:*:*:*:*:*:*:*",
"matchCriteriaId": "090B2050-6F6B-4DCB-9B5F-32E472802DDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.361:*:*:*:*:*:*:*",
"matchCriteriaId": "B0E7D66C-5D53-4D68-BD1E-A98B3FAA9CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:aphpkb:aphpkb:0.371:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE2842C-69B5-4795-BD5D-EBDF66D71405",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in Andy\u0027s PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Andy\u0027s PHP Knowledgebase (Aphpkb) anterior a v0.95.3, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro s para (1) a_viewusers.php o (2) keysearch.php; y permite a administradores autenticados remotamente ejecutar comandos SQl de su elecci\u00f3n a trav\u00e9s de (3) id o (4) el par\u00e1metro start para pending.php, (5) el par\u00e1metro aid para a_authordetails.php. Nota: algunos de estos detalles son obtenidos por terceras partes de informaci\u00f3n."
}
],
"id": "CVE-2011-1546",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-04-04T12:27:38.280",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34476"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/8168"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/8172"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.exploit-db.com/exploits/17084/"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/517261/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/47097"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.uncompiled.com/2011/03/cve-2011-1546/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0802"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66500"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34476"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/8168"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/8172"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.exploit-db.com/exploits/17084/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/517261/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/47097"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.uncompiled.com/2011/03/cve-2011-1546/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0802"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66500"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…