6
CVE-2012-1625
- EPSS 0.57%
- Veröffentlicht 20.09.2012 03:46:36
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
Eval injection vulnerability in the fillpdf_form_export_decode function in fillpdf.admin.inc in the Fill PDF module 6.x-1.x before 6.x-1.16 and 7.x-1.x before 7.x-1.2 for Drupal allows remote authenticated users with administer PDFs privileges to execute arbitrary PHP code via unspecified vectors. NOTE: Some of these details are obtained from third party information.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wizonesolutions ≫ Fillpdf Version6.x-1.0
Wizonesolutions ≫ Fillpdf Version6.x-1.1
Wizonesolutions ≫ Fillpdf Version6.x-1.2
Wizonesolutions ≫ Fillpdf Version6.x-1.3
Wizonesolutions ≫ Fillpdf Version6.x-1.4
Wizonesolutions ≫ Fillpdf Version6.x-1.5
Wizonesolutions ≫ Fillpdf Version6.x-1.6
Wizonesolutions ≫ Fillpdf Version6.x-1.7
Wizonesolutions ≫ Fillpdf Version6.x-1.8
Wizonesolutions ≫ Fillpdf Version6.x-1.9
Wizonesolutions ≫ Fillpdf Version6.x-1.10
Wizonesolutions ≫ Fillpdf Version6.x-1.11
Wizonesolutions ≫ Fillpdf Version6.x-1.12
Wizonesolutions ≫ Fillpdf Version6.x-1.13
Wizonesolutions ≫ Fillpdf Version6.x-1.14
Wizonesolutions ≫ Fillpdf Version6.x-1.15
Wizonesolutions ≫ Fillpdf Version6.x-1.x Updatedev
Wizonesolutions ≫ Fillpdf Version7.x-1.
Wizonesolutions ≫ Fillpdf Version7.x-1.0
Wizonesolutions ≫ Fillpdf Version7.x-1.0 Updatebeta1
Wizonesolutions ≫ Fillpdf Version7.x-1.0 Updatebeta2
Wizonesolutions ≫ Fillpdf Version7.x-1.1
Wizonesolutions ≫ Fillpdf Version7.x-1.x Updatedev
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.57% | 0.659 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6 | 6.8 | 6.4 |
AV:N/AC:M/Au:S/C:P/I:P/A:P
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.