CVE-2014-1613

Dotclear before 2.6.2 allows remote attackers to execute arbitrary PHP code via a serialized object in the dc_passwd cookie to a password-protected page, which is not properly handled by (1) inc/public/lib.urlhandlers.php or (2) plugins/pages/_public.php.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 67%
VendorProductVersion
dotcleardotclear
𝑥
≤ 2.6.1
dotcleardotclear
2.0
dotcleardotclear
2.0:beta_2
dotcleardotclear
2.0:beta_3
dotcleardotclear
2.0:beta_4
dotcleardotclear
2.0:beta_5.2
dotcleardotclear
2.0:beta_5.4
dotcleardotclear
2.0:beta_6
dotcleardotclear
2.0:beta_7
dotcleardotclear
2.0:rc1
dotcleardotclear
2.0:rc2
dotcleardotclear
2.0.1
dotcleardotclear
2.0.2
dotcleardotclear
2.1
dotcleardotclear
2.1.1
dotcleardotclear
2.1.3
dotcleardotclear
2.1.4
dotcleardotclear
2.1.5
dotcleardotclear
2.1.6
dotcleardotclear
2.1.7
dotcleardotclear
2.2
dotcleardotclear
2.2.1
dotcleardotclear
2.2.2
dotcleardotclear
2.2.3
dotcleardotclear
2.3.0
dotcleardotclear
2.3.1
dotcleardotclear
2.4.2
dotcleardotclear
2.4.3
dotcleardotclear
2.4.4
dotcleardotclear
2.5.0
dotcleardotclear
2.5.1
dotcleardotclear
2.5.2
dotcleardotclear
2.5.3
dotcleardotclear
2.6
dotcleardotclear
2.6:rc
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dotclear
zesty
dne
yakkety
dne
xenial
not-affected
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
dne
saucy
ignored
precise
ignored
lucid
dne