Show plain JSON{"id": "CVE-2013-3961", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-03-11T19:37:02.333", "references": [{"url": "http://osvdb.org/94141", "tags": ["Broken Link"], "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.com/files/121978/Simple-PHP-Agenda-2.2.8-SQL-Injection.html", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://seclists.org/fulldisclosure/2013/Jun/67", "tags": ["Exploit", "Issue Tracking"], "source": "cve@mitre.org"}, {"url": "http://www.exploit-db.com/exploits/26136", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/60481", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.webera.fr/advisory-02-php-agenda-isql-exploit", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84938", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/94141", "tags": ["Broken Link"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://packetstormsecurity.com/files/121978/Simple-PHP-Agenda-2.2.8-SQL-Injection.html", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://seclists.org/fulldisclosure/2013/Jun/67", "tags": ["Exploit", "Issue Tracking"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.exploit-db.com/exploits/26136", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/60481", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.webera.fr/advisory-02-php-agenda-isql-exploit", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84938", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-89"}]}], "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in edit_event.php in Simple PHP Agenda before 2.2.9 allows remote authenticated users to execute arbitrary SQL commands via the eventid parameter."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en edit_event.php en Simple PHP Agenda en versiones anteriores a 2.2.9 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro eventid."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:abeel:simple_php_agenda:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE1A846B-9B5C-4BBA-ABB7-2546DE047F31", "versionEndIncluding": "2.2.8"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36A97E3D-006D-4FDE-AF05-3C9EBE1C8CBC"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70CD0C2B-8D37-4226-BF73-7A2241D3F939"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "770B0ABE-C410-47BC-BA79-B2CAD3F4BE58"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4BD49D7-DA3C-41F8-ADA8-BD90F5882011"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FCAED97-D887-4061-9CAE-81EB3394507D"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0498D407-08A5-469B-9A80-83A7BF6BFCEA"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9005EE85-6AA4-4CEB-A822-64AC5A861894"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF70820B-CE38-45AA-81C8-770C85EC9978"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7DB956F-C15D-4221-AAA1-B70B19433AF0"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BCF42D4-1F82-4D8F-ABDB-719215D0B084"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1433DB3-4FE0-4E79-A3C6-3E767C36FF20"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44C4823D-7B10-41CB-9289-1E620148805F"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF07840B-6231-49F8-8518-65082035BE5D"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63DEA07B-701C-410C-ABF6-5721FFD4E250"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:0.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "478F0CB2-6A97-456D-B545-CA88706816CD"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "880DC69B-1168-43FD-8AEC-A15CB1379E48"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C69A274-726F-4E3F-9B2C-CE51362A97DF"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9A16609-F611-4551-86B3-2C183A554702"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1D8C76F-E2A8-46D8-914B-CC811559CEC2"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21C69C39-C08F-412D-83E7-7DAAD253AC13"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B97D9B6-F8A1-4307-AAC6-E9BD58A82235"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A59DFE88-150A-459E-AE22-641630172ABF"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05EDA24E-DD64-4E1A-8477-F4B0F2FB2E53"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:2.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C69A9A0D-1CBC-4DD7-AD29-C6A315DFA254"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:2.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED5FFF8B-B496-4818-990D-54E5EE351236"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:2.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E10D322-F349-4EB4-B64B-F5220109B8C4"}, {"criteria": "cpe:2.3:a:abeel:simple_php_agenda:2.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13CC52ED-1622-421D-B9E6-59D1DAA46A35"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}