{ "schema_version": "1.4.0", "id": "GHSA-gqv4-jgmq-rfxp", "modified": "2022-05-17T01:49:12Z", "published": "2022-05-17T01:49:12Z", "aliases": [ "CVE-2012-0993" ], "details": "Eval injection vulnerability in zp-core/zp-extensions/viewer_size_image.php in ZENphoto 1.4.2, when the viewer_size_image plugin is enabled, allows remote attackers to execute arbitrary PHP code via the viewer_size_image_saved cookie.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0993" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73081" }, { "type": "WEB", "url": "https://www.htbridge.ch/advisory/HTB23070" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0037.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/47875" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/51916" }, { "type": "WEB", "url": "http://www.zenphoto.org/news/zenphoto-1.4.2.1" }, { "type": "WEB", "url": "http://www.zenphoto.org/trac/changeset/8994" }, { "type": "WEB", "url": "http://www.zenphoto.org/trac/changeset/8995" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-02-21T13:31:00Z" } }