Files
cve/2011/CVE-2011-4825.md

18 lines
767 B
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2011-4825](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4825)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
Static code injection vulnerability in inc/function.base.php in Ajax File and Image Manager before 1.1, as used in tinymce before 1.4.2, phpMyFAQ 2.6 before 2.6.19 and 2.7 before 2.7.1, and possibly other products, allows remote attackers to inject arbitrary PHP code into data.php via crafted parameters.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xD13/OSCP-Prep-Guide