mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-28 09:12:00 +00:00
82 lines
2.6 KiB
JSON
82 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2011-4825",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Static code injection vulnerability in inc/function.base.php in Ajax File and Image Manager before 1.1, as used in tinymce before 1.4.2, phpMyFAQ 2.6 before 2.6.19 and 2.7 before 2.7.1, and possibly other products, allows remote attackers to inject arbitrary PHP code into data.php via crafted parameters."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://www.zenphoto.org/trac/ticket/2005",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.zenphoto.org/trac/ticket/2005"
|
|
},
|
|
{
|
|
"name": "http://www.phpmyfaq.de/advisory_2011-10-25.php",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.phpmyfaq.de/advisory_2011-10-25.php"
|
|
},
|
|
{
|
|
"name": "http://www.phpletter.com/en/DOWNLOAD/1/",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.phpletter.com/en/DOWNLOAD/1/"
|
|
},
|
|
{
|
|
"name": "50523",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/50523"
|
|
},
|
|
{
|
|
"name": "18075",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "http://www.exploit-db.com/exploits/18075"
|
|
}
|
|
]
|
|
}
|
|
} |