7.5
CVE-2013-1348
- EPSS 0.62%
- Veröffentlicht 02.06.2014 15:55:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
The Yaml::parse function in Symfony 2.0.x before 2.0.22 remote attackers to execute arbitrary PHP code via a PHP file, a different vulnerability than CVE-2013-1397.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sensiolabs ≫ Symfony Version2.0.0
Sensiolabs ≫ Symfony Version2.0.1
Sensiolabs ≫ Symfony Version2.0.2
Sensiolabs ≫ Symfony Version2.0.3
Sensiolabs ≫ Symfony Version2.0.4
Sensiolabs ≫ Symfony Version2.0.5
Sensiolabs ≫ Symfony Version2.0.6
Sensiolabs ≫ Symfony Version2.0.7
Sensiolabs ≫ Symfony Version2.0.8
Sensiolabs ≫ Symfony Version2.0.9
Sensiolabs ≫ Symfony Version2.0.10
Sensiolabs ≫ Symfony Version2.0.11
Sensiolabs ≫ Symfony Version2.0.12
Sensiolabs ≫ Symfony Version2.0.13
Sensiolabs ≫ Symfony Version2.0.14
Sensiolabs ≫ Symfony Version2.0.15
Sensiolabs ≫ Symfony Version2.0.16
Sensiolabs ≫ Symfony Version2.0.17
Sensiolabs ≫ Symfony Version2.0.18
Sensiolabs ≫ Symfony Version2.0.19
Sensiolabs ≫ Symfony Version2.0.20
Sensiolabs ≫ Symfony Version2.0.21
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.62% | 0.675 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.