CVE-2013-1412
DataLife Engine (DLE) 9.7 allows remote attackers to execute arbitrary PHP code via the catlist[] parameter to engine/preview.php, which is used in a preg_replace function call with an e modifier.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.8510 (85.1%)
Percentil: 99.4%
EPSS: 2026-05-06
Afecta
dleviet:datalife_engineDescripción técnica
DataLife Engine (DLE) 9.7 allows remote attackers to execute arbitrary PHP code via the catlist[] parameter to engine/preview.php, which is used in a preg_replace function call with an e modifier.
Publicada: 2/6/2014, 15:55:09
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://archives.neohapsis.com/archives/bugtraq/2013-01/0117.html
- http://dleviet.com/dle/bug-fix/3281-security-patches-for-dle-97.html
- http://karmainsecurity.com/KIS-2013-01
- http://osvdb.org/89662
- http://secunia.com/advisories/51971
- http://www.exploit-db.com/exploits/24438
- http://www.exploit-db.com/exploits/24444
- http://www.securityfocus.com/bid/57603