SQL injection vulnerability in index.php in GameSiteScript (gss) 3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the params parameter, related to missing input validation of the id field.
References
Configurations
History
21 Nov 2024, 00:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/36362 - | |
References | () http://secunia.com/advisories/25983 - | |
References | () http://www.securityfocus.com/bid/24807 - | |
References | () http://www.vupen.com/english/advisories/2007/2460 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/35292 - | |
References | () https://www.exploit-db.com/exploits/4159 - |
Information
Published : 2007-07-10 00:30
Updated : 2025-04-09 00:30
NVD link : CVE-2007-3631
Mitre link : CVE-2007-3631
CVE.ORG link : CVE-2007-3631
JSON object : View
Products Affected
gamesitescript
- gamesitescript
CWE