7.5
CVE-2011-4825
- EPSS 83.04%
- Published 15.12.2011 03:57:34
- Last modified 11.04.2025 00:51:21
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Static code injection vulnerability in inc/function.base.php in Ajax File and Image Manager before 1.1, as used in tinymce before 1.4.2, phpMyFAQ 2.6 before 2.6.19 and 2.7 before 2.7.1, and possibly other products, allows remote attackers to inject arbitrary PHP code into data.php via crafted parameters.
Data is provided by the National Vulnerability Database (NVD)
Phpletter ≫ Ajax File And Image Manager Version <= 1.0
Phpletter ≫ Ajax File And Image Manager Version0.5
Phpletter ≫ Ajax File And Image Manager Version0.5.5
Phpletter ≫ Ajax File And Image Manager Version0.5.7
Phpletter ≫ Ajax File And Image Manager Version0.6
Phpletter ≫ Ajax File And Image Manager Version0.6.12
Phpletter ≫ Ajax File And Image Manager Version0.7.8
Phpletter ≫ Ajax File And Image Manager Version0.7.10
Phpletter ≫ Ajax File And Image Manager Version0.8
Phpletter ≫ Ajax File And Image Manager Version0.8.8
Phpletter ≫ Ajax File And Image Manager Version0.8.9
Phpletter ≫ Ajax File And Image Manager Version0.8.24
Phpletter ≫ Ajax File And Image Manager Version0.9
Phpletter ≫ Ajax File And Image Manager Version1.0 Updatebeta1
Phpletter ≫ Ajax File And Image Manager Version1.0 Updatebeta2
Phpletter ≫ Ajax File And Image Manager Version1.0 Updaterc1
Phpletter ≫ Ajax File And Image Manager Version1.0 Updaterc2
Phpletter ≫ Ajax File And Image Manager Version1.0 Updaterc3
Phpletter ≫ Ajax File And Image Manager Version1.0 Updaterc4
Phpletter ≫ Ajax File And Image Manager Version1.0 Updaterc5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 83.04% | 0.992 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.