{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T13:05:05.326","vulnerabilities":[{"cve":{"id":"CVE-2011-0635","sourceIdentifier":"cve@mitre.org","published":"2011-01-22T22:00:06.817","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Static code injection vulnerability in Simploo CMS 1.7.1 and earlier allows remote authenticated users to inject arbitrary PHP code into config/custom/base.ini.php via the ftpserver parameter (FTP-Server field) to the sicore/updates/optionssav operation for index.php."},{"lang":"es","value":"Vulnerabilidad de inyección de código estático en Simploo CMS 1.7.1 y versiones anteriores. Permite a usuarios remotos autenticados inyectar código PHP de su elección en config/custom/base.ini.php a través del parámetro ftpserver (campo FTP-Server) de la operación sicore/updates/optionssav de index.php."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:P","baseScore":6.0,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:simploo:simploo_cms:*:*:*:*:*:*:*:*","versionEndIncluding":"1.7.1","matchCriteriaId":"C6C45857-617C-4A0F-862B-2CDFD5E1AE38"},{"vulnerable":true,"criteria":"cpe:2.3:a:simploo:simploo_cms:1.2.0:*:*:*:*:*:*:*","matchCriteriaId":"C0F9A6A2-0F62-482E-A7A4-9266C69A23E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:simploo:simploo_cms:1.3.0:*:*:*:*:*:*:*","matchCriteriaId":"B8A273AB-B437-4D25-BD4C-20C84DFB54F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:simploo:simploo_cms:1.5.0:*:*:*:*:*:*:*","matchCriteriaId":"DEAA5773-0686-4C2A-996C-C773758386FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:simploo:simploo_cms:1.5.2:*:*:*:*:*:*:*","matchCriteriaId":"FCC3C1BC-364E-49AF-A32D-41C8D0FBB433"},{"vulnerable":true,"criteria":"cpe:2.3:a:simploo:simploo_cms:1.7.0:*:*:*:*:*:*:*","matchCriteriaId":"49B813A7-DC51-44E0-BEAA-B77DFB277D25"}]}]}],"references":[{"url":"http://osvdb.org/70487","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/42953","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.exploit-db.com/exploits/16016","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/archive/1/515809/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/45906","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64826","source":"cve@mitre.org"},{"url":"http://osvdb.org/70487","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/42953","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.exploit-db.com/exploits/16016","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/archive/1/515809/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/45906","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64826","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}