Description
SQL injection vulnerability in (1) people.php, (2) track.php, (3) edit.php, (4) document.php, (5) census.php, (6) passthru.php and possibly other php files in phpMyFamily 1.4.0 allows remote attackers to execute arbitrary SQL commands, as demonstrated via (1) the person parameter to people.php or (2) the Login field.
Exploits (1)
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/19787
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/14642
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111143649730845&w=2
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1013493
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/12860
Scores
EPSS
0.0071
EPSS Percentile
72.3%
Details
Status
published
Products (1)
phpmyfamily/phpmyfamily
1.4
Published
May 02, 2005
Tracked Since
Feb 18, 2026