Vulnerabilites related to simple_invoices - simple_invoices
CVE-2007-3430 (GCVE-0-2007-3430)
Vulnerability from cvelistv5
Published
2007-06-27 00:00
Modified
2024-08-07 14:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SQL injection vulnerability in index.php in Simple Invoices 2007 05 25 allows remote attackers to execute arbitrary SQL commands via the submit parameter in an email action.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/35021 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/25789 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/2310 | vdb-entry, x_refsource_VUPEN | |
https://www.exploit-db.com/exploits/4098 | exploit, x_refsource_EXPLOIT-DB | |
http://osvdb.org/36293 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/24601 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:14:13.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "simpleinvoices-index-sql-injection(35021)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35021" }, { "name": "25789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25789" }, { "name": "ADV-2007-2310", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2310" }, { "name": "4098", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/4098" }, { "name": "36293", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36293" }, { "name": "24601", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24601" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-06-24T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in index.php in Simple Invoices 2007 05 25 allows remote attackers to execute arbitrary SQL commands via the submit parameter in an email action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "simpleinvoices-index-sql-injection(35021)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35021" }, { "name": "25789", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25789" }, { "name": "ADV-2007-2310", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2310" }, { "name": "4098", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/4098" }, { "name": "36293", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36293" }, { "name": "24601", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24601" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3430", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in index.php in Simple Invoices 2007 05 25 allows remote attackers to execute arbitrary SQL commands via the submit parameter in an email action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "simpleinvoices-index-sql-injection(35021)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35021" }, { "name": "25789", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25789" }, { "name": "ADV-2007-2310", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2310" }, { "name": "4098", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/4098" }, { "name": "36293", "refsource": "OSVDB", "url": "http://osvdb.org/36293" }, { "name": "24601", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24601" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3430", "datePublished": "2007-06-27T00:00:00", "dateReserved": "2007-06-26T00:00:00", "dateUpdated": "2024-08-07T14:14:13.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-1341 (GCVE-0-2007-1341)
Vulnerability from cvelistv5
Published
2007-03-08 00:00
Modified
2024-08-07 12:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
include/auth/auth.php in Simple Invoices before 2007 03 05 does not use the login system to protect print preview pages for invoices, which might allow attackers to obtain sensitive information.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/24402 | third-party-advisory, x_refsource_SECUNIA | |
http://code.google.com/p/simpleinvoices/issues/detail?id=35 | x_refsource_MISC | |
https://sourceforge.net/project/shownotes.php?group_id=164303&release_id=491300 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/22818 | vdb-entry, x_refsource_BID | |
http://osvdb.org/33860 | vdb-entry, x_refsource_OSVDB | |
http://forum.tufat.com/showthread.php?p=116753#post116753 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:50:35.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "24402", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24402" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://code.google.com/p/simpleinvoices/issues/detail?id=35" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://sourceforge.net/project/shownotes.php?group_id=164303\u0026release_id=491300" }, { "name": "22818", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22818" }, { "name": "33860", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33860" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://forum.tufat.com/showthread.php?p=116753#post116753" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-05T00:00:00", "descriptions": [ { "lang": "en", "value": "include/auth/auth.php in Simple Invoices before 2007 03 05 does not use the login system to protect print preview pages for invoices, which might allow attackers to obtain sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-13T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "24402", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24402" }, { "tags": [ "x_refsource_MISC" ], "url": "http://code.google.com/p/simpleinvoices/issues/detail?id=35" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://sourceforge.net/project/shownotes.php?group_id=164303\u0026release_id=491300" }, { "name": "22818", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22818" }, { "name": "33860", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33860" }, { "tags": [ "x_refsource_MISC" ], "url": "http://forum.tufat.com/showthread.php?p=116753#post116753" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1341", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "include/auth/auth.php in Simple Invoices before 2007 03 05 does not use the login system to protect print preview pages for invoices, which might allow attackers to obtain sensitive information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "24402", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24402" }, { "name": "http://code.google.com/p/simpleinvoices/issues/detail?id=35", "refsource": "MISC", "url": "http://code.google.com/p/simpleinvoices/issues/detail?id=35" }, { "name": "https://sourceforge.net/project/shownotes.php?group_id=164303\u0026release_id=491300", "refsource": "CONFIRM", "url": "https://sourceforge.net/project/shownotes.php?group_id=164303\u0026release_id=491300" }, { "name": "22818", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22818" }, { "name": "33860", "refsource": "OSVDB", "url": "http://osvdb.org/33860" }, { "name": "http://forum.tufat.com/showthread.php?p=116753#post116753", "refsource": "MISC", "url": "http://forum.tufat.com/showthread.php?p=116753#post116753" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1341", "datePublished": "2007-03-08T00:00:00", "dateReserved": "2007-03-07T00:00:00", "dateUpdated": "2024-08-07T12:50:35.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4932 (GCVE-0-2012-4932)
Vulnerability from cvelistv5
Published
2012-12-28 11:00
Modified
2024-09-16 17:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in SimpleInvoices before stable-2012-1-CIS3000 allow remote attackers to inject arbitrary web script or HTML via (1) the having parameter in a manage action to index.php; (2) the Email field in an Add User action; (3) the Customer Name field in an Add Customer action; the (4) Street address, (5) Street address 2, (6) City, (7) Zip code, (8) State, (9) Country, (10) Mobile Phone, (11) Phone, (12) Fax, (13) Email, (14) PayPal business name, (15) PayPal notify url, (16) PayPal return url, (17) Eway customer ID, (18) Custom field 1, (19) Custom field 2, (20) Custom field 3, or (21) Custom field 4 field in an Add Biller action; (22) the Customer field in an Add Invoice action; the (23) Invoice or (24) Notes field in a Process Payment action; (25) the Payment type description field in a Payment Types action; (26) the Description field in an Invoice Preferences action; (27) the Description field in a Manage Products action; or (28) the Description field in a Tax Rates action.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2012-12/0074.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:50:18.398Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20121209 SimpleInvoices 2011.1 Cross-Site-Scripting (XSS) Vulnerabilities CVE-2012-4932", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0074.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in SimpleInvoices before stable-2012-1-CIS3000 allow remote attackers to inject arbitrary web script or HTML via (1) the having parameter in a manage action to index.php; (2) the Email field in an Add User action; (3) the Customer Name field in an Add Customer action; the (4) Street address, (5) Street address 2, (6) City, (7) Zip code, (8) State, (9) Country, (10) Mobile Phone, (11) Phone, (12) Fax, (13) Email, (14) PayPal business name, (15) PayPal notify url, (16) PayPal return url, (17) Eway customer ID, (18) Custom field 1, (19) Custom field 2, (20) Custom field 3, or (21) Custom field 4 field in an Add Biller action; (22) the Customer field in an Add Invoice action; the (23) Invoice or (24) Notes field in a Process Payment action; (25) the Payment type description field in a Payment Types action; (26) the Description field in an Invoice Preferences action; (27) the Description field in a Manage Products action; or (28) the Description field in a Tax Rates action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-12-28T11:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20121209 SimpleInvoices 2011.1 Cross-Site-Scripting (XSS) Vulnerabilities CVE-2012-4932", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0074.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4932", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in SimpleInvoices before stable-2012-1-CIS3000 allow remote attackers to inject arbitrary web script or HTML via (1) the having parameter in a manage action to index.php; (2) the Email field in an Add User action; (3) the Customer Name field in an Add Customer action; the (4) Street address, (5) Street address 2, (6) City, (7) Zip code, (8) State, (9) Country, (10) Mobile Phone, (11) Phone, (12) Fax, (13) Email, (14) PayPal business name, (15) PayPal notify url, (16) PayPal return url, (17) Eway customer ID, (18) Custom field 1, (19) Custom field 2, (20) Custom field 3, or (21) Custom field 4 field in an Add Biller action; (22) the Customer field in an Add Invoice action; the (23) Invoice or (24) Notes field in a Process Payment action; (25) the Payment type description field in a Payment Types action; (26) the Description field in an Invoice Preferences action; (27) the Description field in a Manage Products action; or (28) the Description field in a Tax Rates action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20121209 SimpleInvoices 2011.1 Cross-Site-Scripting (XSS) Vulnerabilities CVE-2012-4932", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0074.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4932", "datePublished": "2012-12-28T11:00:00Z", "dateReserved": "2012-09-17T00:00:00Z", "dateUpdated": "2024-09-16T17:08:50.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-0787 (GCVE-0-2007-0787)
Vulnerability from cvelistv5
Published
2007-02-06 19:00
Modified
2024-08-07 12:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PHP remote file inclusion vulnerability in controller.php in Simple Invoices before 20070202 allows remote attackers to execute arbitrary PHP code via a URL in the (1) module or (2) view parameter. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/31796 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/24040 | third-party-advisory, x_refsource_SECUNIA | |
http://www.simpleinvoices.org/index.php?news=25 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/22389 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32207 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/0481 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:34:20.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31796", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/31796" }, { "name": "24040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24040" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.simpleinvoices.org/index.php?news=25" }, { "name": "22389", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22389" }, { "name": "simpleinvoices-controller-file-include(32207)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32207" }, { "name": "ADV-2007-0481", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0481" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in controller.php in Simple Invoices before 20070202 allows remote attackers to execute arbitrary PHP code via a URL in the (1) module or (2) view parameter. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31796", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/31796" }, { "name": "24040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24040" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.simpleinvoices.org/index.php?news=25" }, { "name": "22389", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22389" }, { "name": "simpleinvoices-controller-file-include(32207)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32207" }, { "name": "ADV-2007-0481", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0481" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP remote file inclusion vulnerability in controller.php in Simple Invoices before 20070202 allows remote attackers to execute arbitrary PHP code via a URL in the (1) module or (2) view parameter. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31796", "refsource": "OSVDB", "url": "http://osvdb.org/31796" }, { "name": "24040", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24040" }, { "name": "http://www.simpleinvoices.org/index.php?news=25", "refsource": "CONFIRM", "url": "http://www.simpleinvoices.org/index.php?news=25" }, { "name": "22389", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22389" }, { "name": "simpleinvoices-controller-file-include(32207)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32207" }, { "name": "ADV-2007-0481", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0481" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0787", "datePublished": "2007-02-06T19:00:00", "dateReserved": "2007-02-06T00:00:00", "dateUpdated": "2024-08-07T12:34:20.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2007-02-06 19:28
Modified
2025-04-09 00:30
Severity ?
Summary
PHP remote file inclusion vulnerability in controller.php in Simple Invoices before 20070202 allows remote attackers to execute arbitrary PHP code via a URL in the (1) module or (2) view parameter. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
simple_invoices | simple_invoices | 2007-02-02 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simple_invoices:simple_invoices:2007-02-02:*:*:*:*:*:*:*", "matchCriteriaId": "07A4935F-05F9-4C93-8ED4-40811C9DF55D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in controller.php in Simple Invoices before 20070202 allows remote attackers to execute arbitrary PHP code via a URL in the (1) module or (2) view parameter. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Vulnerabilidad de inclusi\u00f3n remota de archivo PHP en controller.php en Simple Invoices anterior al 02/02/2007 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en los par\u00e1metros (1) module o (2) view. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceros." } ], "evaluatorSolution": "Successful exploitation requires that \"register_globals\" is enabled and \"magic_quotes_gpc\" is disabled.", "id": "CVE-2007-0787", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-06T19:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/31796" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24040" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22389" }, { "source": "cve@mitre.org", "url": "http://www.simpleinvoices.org/index.php?news=25" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0481" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32207" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/31796" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.simpleinvoices.org/index.php?news=25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32207" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-06-27 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in index.php in Simple Invoices 2007 05 25 allows remote attackers to execute arbitrary SQL commands via the submit parameter in an email action.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
simple_invoices | simple_invoices | 2007-05-25 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simple_invoices:simple_invoices:2007-05-25:*:*:*:*:*:*:*", "matchCriteriaId": "48E14EBE-E4B6-4227-B877-90199FB767CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in index.php in Simple Invoices 2007 05 25 allows remote attackers to execute arbitrary SQL commands via the submit parameter in an email action." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en index.php de Simple Invoices 2007 05 25 permite a atacantes remotos ejecutar comandos sql de su elecci\u00f3n mediante el par\u00e1metro submit en una acci\u00f3n email." } ], "id": "CVE-2007-3430", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-06-27T00:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/36293" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25789" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/24601" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2310" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35021" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/4098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/24601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/4098" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-12-28 11:48
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in SimpleInvoices before stable-2012-1-CIS3000 allow remote attackers to inject arbitrary web script or HTML via (1) the having parameter in a manage action to index.php; (2) the Email field in an Add User action; (3) the Customer Name field in an Add Customer action; the (4) Street address, (5) Street address 2, (6) City, (7) Zip code, (8) State, (9) Country, (10) Mobile Phone, (11) Phone, (12) Fax, (13) Email, (14) PayPal business name, (15) PayPal notify url, (16) PayPal return url, (17) Eway customer ID, (18) Custom field 1, (19) Custom field 2, (20) Custom field 3, or (21) Custom field 4 field in an Add Biller action; (22) the Customer field in an Add Invoice action; the (23) Invoice or (24) Notes field in a Process Payment action; (25) the Payment type description field in a Payment Types action; (26) the Description field in an Invoice Preferences action; (27) the Description field in a Manage Products action; or (28) the Description field in a Tax Rates action.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
simple_invoices | simple_invoices | * | |
simple_invoices | simple_invoices | 2006-12-11 | |
simple_invoices | simple_invoices | 2007-01-25 | |
simple_invoices | simple_invoices | 2007-02-02 | |
simple_invoices | simple_invoices | 2007-05-25 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simple_invoices:simple_invoices:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DD8B661-41AD-47DF-B46F-388A7ECA21DC", "versionEndIncluding": "2011.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:simple_invoices:simple_invoices:2006-12-11:*:*:*:*:*:*:*", "matchCriteriaId": "7D77E73A-41DA-4806-9BA8-6B348EC68E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:simple_invoices:simple_invoices:2007-01-25:*:*:*:*:*:*:*", "matchCriteriaId": "16F9CCDF-6100-45A5-94F9-ED30EB68B63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:simple_invoices:simple_invoices:2007-02-02:*:*:*:*:*:*:*", "matchCriteriaId": "07A4935F-05F9-4C93-8ED4-40811C9DF55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:simple_invoices:simple_invoices:2007-05-25:*:*:*:*:*:*:*", "matchCriteriaId": "48E14EBE-E4B6-4227-B877-90199FB767CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in SimpleInvoices before stable-2012-1-CIS3000 allow remote attackers to inject arbitrary web script or HTML via (1) the having parameter in a manage action to index.php; (2) the Email field in an Add User action; (3) the Customer Name field in an Add Customer action; the (4) Street address, (5) Street address 2, (6) City, (7) Zip code, (8) State, (9) Country, (10) Mobile Phone, (11) Phone, (12) Fax, (13) Email, (14) PayPal business name, (15) PayPal notify url, (16) PayPal return url, (17) Eway customer ID, (18) Custom field 1, (19) Custom field 2, (20) Custom field 3, or (21) Custom field 4 field in an Add Biller action; (22) the Customer field in an Add Invoice action; the (23) Invoice or (24) Notes field in a Process Payment action; (25) the Payment type description field in a Payment Types action; (26) the Description field in an Invoice Preferences action; (27) the Description field in a Manage Products action; or (28) the Description field in a Tax Rates action." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en SimpleVoices antes de stable-2012-1-CIS3000 permiten a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de (1) el par\u00e1metro \u0027having\u0027 de una acci\u00f3n \u0027manage\u0027 a index.php, (2) el campo Email en una acci\u00f3n \u0027Add User\u0027, (3) el campo Nombre del cliente en una acci\u00f3n \u0027A\u00f1adir Cliente\u0027, (4) la direcci\u00f3n de la calle, (5) Street Address 2, (6) Ciudad (7), c\u00f3digo postal, (8) Estado, (9) Campo (10), tel\u00e9fono m\u00f3vil (11) tel\u00e9fono, (12) fax, (13) email, (14) nombre de la empresa en PayPal, (15) url de notificaci\u00f3n de PayPal, (16) url de retorno de Paypal, (17) ID de cliente de Eway, (18) campo personalizado 1, (19) campo personalizado 2, (20) campo personalizado 3, o (21) campo persoalizado 4 en acci\u00f3n \u0027Add Biller\u0027, (22) el campo Cliente en una acci\u00f3n de \u0027Agregar facturas\u0027 , (23) factura, (24) el campo Notas en una acci\u00f3n de procesar pago, (25) el campo de descripci\u00f3n de tipo de pago en una acci\u00f3n \u0027Payment Types\u0027, (26) el campo Descripci\u00f3n en una acci\u00f3n Preferencias de factura, (27) el campo Descripci\u00f3n en una acci\u00f3n \u0027Manage Productos\u0027, o (28) en el campo Descripci\u00f3n de la acci\u00f3n \u0027Tax Rates\u0027." } ], "id": "CVE-2012-4932", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-12-28T11:48:44.627", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0074.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0074.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-08 22:19
Modified
2025-04-09 00:30
Severity ?
Summary
include/auth/auth.php in Simple Invoices before 2007 03 05 does not use the login system to protect print preview pages for invoices, which might allow attackers to obtain sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
simple_invoices | simple_invoices | 2006-12-11 | |
simple_invoices | simple_invoices | 2007-01-25 | |
simple_invoices | simple_invoices | 2007-02-02 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simple_invoices:simple_invoices:2006-12-11:*:*:*:*:*:*:*", "matchCriteriaId": "7D77E73A-41DA-4806-9BA8-6B348EC68E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:simple_invoices:simple_invoices:2007-01-25:*:*:*:*:*:*:*", "matchCriteriaId": "16F9CCDF-6100-45A5-94F9-ED30EB68B63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:simple_invoices:simple_invoices:2007-02-02:*:*:*:*:*:*:*", "matchCriteriaId": "07A4935F-05F9-4C93-8ED4-40811C9DF55D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "include/auth/auth.php in Simple Invoices before 2007 03 05 does not use the login system to protect print preview pages for invoices, which might allow attackers to obtain sensitive information." }, { "lang": "es", "value": "include/auth/auth.php en el Simple Invoices en versiones anteriores a la 2007 03 05 no utiliza el sistema de autenticaci\u00f3n para proteger las previsualizaciones de las p\u00e1ginas a imprimir para las facturas, lo que permite a atacantes obtener informaci\u00f3n sensible." } ], "id": "CVE-2007-1341", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-08T22:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://code.google.com/p/simpleinvoices/issues/detail?id=35" }, { "source": "cve@mitre.org", "url": "http://forum.tufat.com/showthread.php?p=116753#post116753" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/33860" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24402" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/22818" }, { "source": "cve@mitre.org", "url": "https://sourceforge.net/project/shownotes.php?group_id=164303\u0026release_id=491300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/simpleinvoices/issues/detail?id=35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://forum.tufat.com/showthread.php?p=116753#post116753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/33860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/22818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://sourceforge.net/project/shownotes.php?group_id=164303\u0026release_id=491300" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }