Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-4825 | First vendor Publication | 2011-12-14 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Static code injection vulnerability in inc/function.base.php in Ajax File and Image Manager before 1.1, as used in tinymce before 1.4.2, phpMyFAQ 2.6 before 2.6.19 and 2.7 before 2.7.1, and possibly other products, allows remote attackers to inject arbitrary PHP code into data.php via crafted parameters. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4825 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-06-18 | Name : Log1 CMS 'data.php' PHP Code Injection Vulnerability File : nvt/gb_log1_cms_50523.nasl |
2011-11-07 | Name : Ajax File and Image Manager 'data.php' PHP Code Injection Vulnerability File : nvt/gb_afim_50523.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
76928 | Ajax File and Image Manager /ajaxfilemanager/ajax_create_folder.php Unspecifi... |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:03:19 |
|
2024-11-28 12:28:02 |
|
2021-05-04 12:18:00 |
|
2021-04-22 01:21:18 |
|
2020-05-23 13:16:58 |
|
2020-05-23 01:47:40 |
|
2020-05-23 00:32:20 |
|
2013-05-10 23:11:57 |
|