Vulnerability Description
SQL injection vulnerability in mods/hours/data/get_hours.php in PHP Volunteer Management 1.0.2 allows remote attackers to execute arbitrary SQL commands via the id parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Shawn Bradley | Php Volunteer Management | 1.0.2 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0206.htmlExploit
- http://secunia.com/advisories/48988Vendor Advisory
- http://www.exploit-db.com/exploits/18788Exploit
- http://www.osvdb.org/81494
- http://www.securityfocus.com/bid/53261Exploit
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0206.htmlExploit
- http://secunia.com/advisories/48988Vendor Advisory
- http://www.exploit-db.com/exploits/18788Exploit
- http://www.osvdb.org/81494
- http://www.securityfocus.com/bid/53261Exploit
FAQ
What is CVE-2012-6504?
CVE-2012-6504 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in mods/hours/data/get_hours.php in PHP Volunteer Management 1.0.2 allows remote attackers to execute arbitrary SQL commands via the id parameter.
How severe is CVE-2012-6504?
CVE-2012-6504 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-6504?
Check the references section above for vendor advisories and patch information. Affected products include: Shawn Bradley Php Volunteer Management.