9.5 High
AI Score
Confidence
Low
5.1 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
0.019 Low
EPSS
Percentile
88.5%
Multiple SQL injection vulnerabilities in PhpMyFactures 1.0, and possibly 1.2 and earlier, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the (1) id_pays parameter in (a) /pays/modifier_pays.php; (2) id_produit, (3) quantite, (4) prix_ht, and (5) date parameter in (b) /stocks/ajouter.php; (6) id_cat parameter in © /produits/modifier_cat.php; (7) id_client parameter in (d) /clients/modifier_client.php; (8) id_remise parameter in (e) /remises/index.php; (9) id_taux parameter in (f) /tva/index.php; (10) ref_produit, and (11) id_stock parameter in (g) /stocks/index.php; (12) id_pays parameter in (h) /pays/index.php; and (13) id_cat parameter in (i) /produits/index.php.
CPE | Name | Operator | Version |
---|---|---|---|
phpmyfactures:phpmyfactures | phpmyfactures | eq | 1.0 |
phpmyfactures:phpmyfactures | phpmyfactures | le | 1.2 |
secunia.com/advisories/20642
securityreason.com/securityalert/1111
www.acid-root.new.fr/advisories/phpmyfactures.txt
www.osvdb.org/26467
www.osvdb.org/26469
www.osvdb.org/26470
www.osvdb.org/26471
www.osvdb.org/26472
www.osvdb.org/26473
www.osvdb.org/26474
www.osvdb.org/26475
www.osvdb.org/26476
www.securityfocus.com/archive/1/437025/100/0/threaded
exchange.xforce.ibmcloud.com/vulnerabilities/27209