Summary
PHP Live! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PHP Live! 3.3 is vulnerable
other versions may also be affected.
References
Updated on 2017-03-28
Severity
Classification
-
CVE CVE-2009-3062 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apache Struts2 Showcase Skill Name Remote Code Execution Vulnerability
- AlienVault OSSIM SQL Injection and Remote Code Execution Vulnerabilities
- 4psa Voipnow Local File Inclusion Vulnerability
- Apache Tomcat AJP Protocol Security Bypass Vulnerability
- A-A-S Application Access Server Multiple Vulnerabilities