VYPR
Unrated severityNVD Advisory· Published Apr 4, 2011· Updated Apr 29, 2026

CVE-2011-1546

CVE-2011-1546

Description

Multiple SQL injection vulnerabilities in Andy's PHP Knowledgebase (Aphpkb) before 0.95.3 allow remote attackers to execute arbitrary SQL commands via the s parameter to (1) a_viewusers.php or (2) keysearch.php; and allow remote authenticated administrators to execute arbitrary SQL commands via the (3) id or (4) start parameter to pending.php, or the (5) aid parameter to a_authordetails.php. NOTE: some of these details are obtained from third party information.

Affected products

92
  • Aphpkb/Aphpkb92 versions
    cpe:2.3:a:aphpkb:aphpkb:*:*:*:*:*:*:*:*+ 91 more
    • cpe:2.3:a:aphpkb:aphpkb:*:*:*:*:*:*:*:*range: <=0.95.2
    • cpe:2.3:a:aphpkb:aphpkb:0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.21:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.31:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.33:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.35:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.361:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.371:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.38:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.39:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.41:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.42:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.43:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.44:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.45:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.51:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.52:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.53:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.54:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.55:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.56:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.57:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.58:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.59:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.61:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.62:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.63:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.64:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.65:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.66:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.67:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.70:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.71:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.72:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.73:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.74:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.75:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.76:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.77:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.78:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.79:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.80:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.81:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.82:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.83:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.84:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.85:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.86:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.87:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.88:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.88.5:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.88.6:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.88.7:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.88.8:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.89:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.9:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.91:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.92:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.92.1:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.92.2:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.92.3:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.92.4:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.92.5:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.92.6:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.92.7:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.92.8:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.92.9:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.93.1:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.93.2:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.93.3:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.93.4:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.93.5:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.93.6:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.93.7:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.93.8:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.93.9:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.94.1:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.94.2:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.94.3:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.94.4:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.94.5:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.94.6:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.94.7:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.94.8:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.94.9:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.95:*:*:*:*:*:*:*
    • cpe:2.3:a:aphpkb:aphpkb:0.95.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.