7.5
CVE-2011-4825
- EPSS 83.04%
- Veröffentlicht 15.12.2011 03:57:34
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Static code injection vulnerability in inc/function.base.php in Ajax File and Image Manager before 1.1, as used in tinymce before 1.4.2, phpMyFAQ 2.6 before 2.6.19 and 2.7 before 2.7.1, and possibly other products, allows remote attackers to inject arbitrary PHP code into data.php via crafted parameters.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Phpletter ≫ Ajax File And Image Manager Version <= 1.0
Phpletter ≫ Ajax File And Image Manager Version0.5
Phpletter ≫ Ajax File And Image Manager Version0.5.5
Phpletter ≫ Ajax File And Image Manager Version0.5.7
Phpletter ≫ Ajax File And Image Manager Version0.6
Phpletter ≫ Ajax File And Image Manager Version0.6.12
Phpletter ≫ Ajax File And Image Manager Version0.7.8
Phpletter ≫ Ajax File And Image Manager Version0.7.10
Phpletter ≫ Ajax File And Image Manager Version0.8
Phpletter ≫ Ajax File And Image Manager Version0.8.8
Phpletter ≫ Ajax File And Image Manager Version0.8.9
Phpletter ≫ Ajax File And Image Manager Version0.8.24
Phpletter ≫ Ajax File And Image Manager Version0.9
Phpletter ≫ Ajax File And Image Manager Version1.0 Updatebeta1
Phpletter ≫ Ajax File And Image Manager Version1.0 Updatebeta2
Phpletter ≫ Ajax File And Image Manager Version1.0 Updaterc1
Phpletter ≫ Ajax File And Image Manager Version1.0 Updaterc2
Phpletter ≫ Ajax File And Image Manager Version1.0 Updaterc3
Phpletter ≫ Ajax File And Image Manager Version1.0 Updaterc4
Phpletter ≫ Ajax File And Image Manager Version1.0 Updaterc5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 83.04% | 0.992 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.