Show plain JSON{"id": "CVE-2007-5056", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2007-09-24T22:17:00.000", "references": [{"url": "http://osvdb.org/40596", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/41422", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/41426", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/41427", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/41428", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/26928", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/28859", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/28873", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/28874", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/28886", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.attrition.org/pipermail/vim/2007-September/001800.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/25768", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2007/3261", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36733", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40389", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40393", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40395", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40396", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/4442", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/5090", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/5091", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/5097", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/5098", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/40596", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/41422", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/41426", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/41427", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/41428", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/26928", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/28859", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/28873", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/28874", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/28886", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.attrition.org/pipermail/vim/2007-September/001800.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/25768", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2007/3261", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36733", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40389", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40393", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40395", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40396", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/4442", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/5090", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/5091", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/5097", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/5098", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-94"}]}], "descriptions": [{"lang": "en", "value": "Eval injection vulnerability in adodb-perf-module.inc.php in ADOdb Lite 1.42 and earlier, as used in products including CMS Made Simple, SAPID CMF, Journalness, PacerCMS, and Open-Realty, allows remote attackers to execute arbitrary code via PHP sequences in the last_module parameter."}, {"lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n Eval en el archivo adodb-perf-module.inc.php en ADOdb Lite versiones 1.42 y anteriores, como es usado en productos como CMS Made Simple, SAPID CMF, Journalness, PacerCMS y Open-Realty, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de secuencias PHP en el par\u00e1metro last_module."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:adodb_lite:adodb_lite:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F7145D0-2043-42D2-B2C5-56271595534F", "versionEndIncluding": "1.42"}, {"criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B439441E-3421-44BA-BBD0-4D23C582AD00"}, {"criteria": "cpe:2.3:a:journalness:journalness:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73F8DC33-618D-480D-A42B-3E86E612A862"}, {"criteria": "cpe:2.3:a:open-realty:open-realty:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C9B4A04-AFD2-4841-A4CB-CF89C4332884"}, {"criteria": "cpe:2.3:a:pacercms:pacercms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4001203-43C4-4EC4-8CEA-B716847B85DF"}, {"criteria": "cpe:2.3:a:sapid:sapid_cmf:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2658BB12-6F19-460B-9BD8-93ECC775E506"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}