CVE-2007-4863

Quirm Saxon - SQL Injection

Title source: rule
STIX 2.1

Description

SQL injection vulnerability in example.php in SAXON 5.4 allows remote attackers to execute arbitrary SQL commands via the template parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by netVigilance · textwebappsphp
https://www.exploit-db.com/exploits/30719

References (7)

Core 7
Core References
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/26238
Various Sources x_refsource_confirm
http://www.quirm.net/punbb/viewtopic.php?id=129
Various Sources x_refsource_misc
http://www.netvigilance.com/advisory0055
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/482921/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38839
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38136
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3309

Scores

EPSS 0.0043
EPSS Percentile 62.9%

Details

CWE
CWE-89
Status published
Products (1)
quirm/saxon 5.4
Published Oct 30, 2007
Tracked Since Feb 18, 2026