| Portée | Impact | Probabilité |
|---|---|---|
| Other Confidentiality Integrity Availability | Alter Execution Logic, Execute Unauthorized Code or Commands Note: This weakness could affect the control flow of the application and allow execution of untrusted code. |
| Références | Description |
|---|---|
CVE-2013-1402 | Execution-after-redirect allows access to application configuration details. |
CVE-2009-1936 | chain: library file sends a redirect if it is directly requested but continues to execute, allowing remote file inclusion and path traversal. |
CVE-2007-2713 | Remote attackers can obtain access to administrator functionality through EAR. |
CVE-2007-4932 | Remote attackers can obtain access to administrator functionality through EAR. |
CVE-2007-5578 | Bypass of authentication step through EAR. |
CVE-2007-2713 | Chain: Execution after redirect triggers eval injection. |
CVE-2007-6652 | chain: execution after redirect allows non-administrator to perform static code injection. |
| Nom | Organisation | Date | Date de publication | Version |
|---|---|---|---|---|
| CWE Content Team | MITRE | 1.0 |
| Nom | Organisation | Date | Commentaire |
|---|---|---|---|
| CWE Content Team | MITRE | updated Common_Consequences | |
| CWE Content Team | MITRE | updated Common_Consequences, Demonstrative_Examples, Relationships | |
| CWE Content Team | MITRE | updated Demonstrative_Examples | |
| CWE Content Team | MITRE | updated Alternate_Terms, Name, Observed_Examples, References | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Demonstrative_Examples | |
| CWE Content Team | MITRE | updated References | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Mapping_Notes | |
| CWE Content Team | MITRE | updated Demonstrative_Examples | |
| CWE Content Team | MITRE | updated References | |
| CWE Content Team | MITRE | updated Applicable_Platforms |