CVE-2007-3631

SQL injection vulnerability in index.php in GameSiteScript (gss) 3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the params parameter, related to missing input validation of the id field.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gamesitescript:gamesitescript:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:33

Type Values Removed Values Added
References () http://osvdb.org/36362 - () http://osvdb.org/36362 -
References () http://secunia.com/advisories/25983 - () http://secunia.com/advisories/25983 -
References () http://www.securityfocus.com/bid/24807 - () http://www.securityfocus.com/bid/24807 -
References () http://www.vupen.com/english/advisories/2007/2460 - () http://www.vupen.com/english/advisories/2007/2460 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/35292 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/35292 -
References () https://www.exploit-db.com/exploits/4159 - () https://www.exploit-db.com/exploits/4159 -

Information

Published : 2007-07-10 00:30

Updated : 2025-04-09 00:30


NVD link : CVE-2007-3631

Mitre link : CVE-2007-3631

CVE.ORG link : CVE-2007-3631


JSON object : View

Products Affected

gamesitescript

  • gamesitescript