A Code Execution Vulnerability exists in OpenX Ad Server 2.8.10 due to a backdoor in flowplayer-3.1.1.min.js library, which could let a remote malicious user execute arbitrary PHP code
                
            References
                    | Link | Resource | 
|---|---|
| http://www.exploit-db.com/exploits/27529 | Exploit Third Party Advisory VDB Entry | 
| http://www.openwall.com/lists/oss-security/2013/08/07/2 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/61650 | Third Party Advisory VDB Entry | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/86259 | Third Party Advisory VDB Entry | 
| https://packetstormsecurity.com/files/cve/CVE-2013-4211 | Exploit Third Party Advisory VDB Entry | 
Configurations
                    History
                    No history.
Information
                Published : 2020-02-14 20:15
Updated : 2020-02-19 12:48
NVD link : CVE-2013-4211
Mitre link : CVE-2013-4211
CVE.ORG link : CVE-2013-4211
JSON object : View
Products Affected
                openx
- openx
 
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
