7.5

CVE-2012-5223

Exploit
The proc_deutf function in includes/functions_vbseocp_abstract.php in vBSEO 3.5.0, 3.5.1, 3.5.2, 3.6.0, and earlier allows remote attackers to insert and execute arbitrary PHP code via "complex curly syntax" in the char_repl parameter, which is inserted into a regular expression that is processed by the preg_replace function with the eval switch.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CrawlabilityVbseo Version <= 3.6.0
CrawlabilityVbseo Version2.0.0
CrawlabilityVbseo Version2.1.0
CrawlabilityVbseo Version2.1.1
CrawlabilityVbseo Version2.2.0
CrawlabilityVbseo Version2.3.0
CrawlabilityVbseo Version2.4.0
CrawlabilityVbseo Version2.4.5
CrawlabilityVbseo Version3.0.0
CrawlabilityVbseo Version3.0.0 Updaterc2
CrawlabilityVbseo Version3.0.0 Updaterc3
CrawlabilityVbseo Version3.0.0 Updaterc4
CrawlabilityVbseo Version3.0.0 Updaterc5
CrawlabilityVbseo Version3.0.0 Updaterc6
CrawlabilityVbseo Version3.1.0
CrawlabilityVbseo Version3.2.0
CrawlabilityVbseo Version3.2.0 Updaterc4
CrawlabilityVbseo Version3.2.0 Updaterc5
CrawlabilityVbseo Version3.2.0 Updaterc7
CrawlabilityVbseo Version3.2.0 Updaterc8
CrawlabilityVbseo Version3.3.0
CrawlabilityVbseo Version3.3.0 Updaterc1
CrawlabilityVbseo Version3.3.0 Updaterc2
CrawlabilityVbseo Version3.3.1
CrawlabilityVbseo Version3.5.0
CrawlabilityVbseo Version3.5.0 Updatebeta1
CrawlabilityVbseo Version3.5.0 Updatebeta2
CrawlabilityVbseo Version3.5.0 Updaterc1
CrawlabilityVbseo Version3.5.0 Updaterc2
CrawlabilityVbseo Version3.5.0 Updaterc3
CrawlabilityVbseo Version3.5.1
CrawlabilityVbseo Version3.5.2
CrawlabilityVbseo Version3.6.0 Updatebeta1
CrawlabilityVbseo Version3.6.0 Updaterc1
CrawlabilityVbseo Version3.6.0 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 79.64% 0.99
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.