Vulnerability Details : CVE-2011-1555
SQL injection vulnerability in saa.php in Andy's PHP Knowledgebase (Aphpkb) 0.95.3 and earlier allows remote attackers to execute arbitrary SQL commands via the aid parameter, a different vulnerability than CVE-2011-1546. NOTE: some of these details are obtained from third party information.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2011-1555
Probability of exploitation activity in the next 30 days: 0.13%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 47 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-1555
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2011-1555
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1555
-
http://www.vupen.com/english/advisories/2011/0802
Webmail | OVH- OVHVendor Advisory
-
http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html
aphpkb: Release of Aphpkb 0.95.3 - Security UpdatePatch
Products affected by CVE-2011-1555
- cpe:2.3:a:aphpkb:aphpkb:*:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.92.9:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.94.8:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.94.7:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.93.9:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.93.8:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.93.1:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.95:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.94.9:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.94.2:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.94.1:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.93.3:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.93.2:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.92.2:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.92.1:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.88.6:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.88.5:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.82:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.81:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.80:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.73:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.72:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.63:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.62:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.54:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.53:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.42:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.41:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.33:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.31:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.92.8:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.92.7:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.91:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.88:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.87:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.79:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.78:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.71:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.70:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.61:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.52:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.51:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.39:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.21:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.95.1:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.94.4:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.94.3:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.93.5:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.93.4:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.92.4:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.92.3:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.88.8:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.88.7:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.84:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.83:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.75:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.74:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.65:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.64:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.57:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.56:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.55:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.44:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.43:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.361:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.35:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.94.6:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.94.5:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.93.7:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.93.6:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.92.6:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.92.5:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.89:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.86:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.85:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.77:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.76:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.67:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.66:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.59:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.58:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.45:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.38:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.371:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.1:*:*:*:*:*:*:*
- cpe:2.3:a:aphpkb:aphpkb:0.95.2:*:*:*:*:*:*:*