Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-1613

Опубликовано: 16 мая 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Dotclear before 2.6.2 allows remote attackers to execute arbitrary PHP code via a serialized object in the dc_passwd cookie to a password-protected page, which is not properly handled by (1) inc/public/lib.urlhandlers.php or (2) plugins/pages/_public.php.

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
saucy

ignored

end of life
trusty

not-affected

trusty/esm

DNE

trusty was not-affected
upstream

released

2.6.2

Показывать по

EPSS

Процентиль: 68%
0.0058
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

Dotclear before 2.6.2 allows remote attackers to execute arbitrary PHP code via a serialized object in the dc_passwd cookie to a password-protected page, which is not properly handled by (1) inc/public/lib.urlhandlers.php or (2) plugins/pages/_public.php.

debian
больше 11 лет назад

Dotclear before 2.6.2 allows remote attackers to execute arbitrary PHP ...

github
больше 3 лет назад

Dotclear before 2.6.2 allows remote attackers to execute arbitrary PHP code via a serialized object in the dc_passwd cookie to a password-protected page, which is not properly handled by (1) inc/public/lib.urlhandlers.php or (2) plugins/pages/_public.php.

EPSS

Процентиль: 68%
0.0058
Низкий

7.5 High

CVSS2