Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-4031

Опубликовано: 06 дек. 2005
Источник: debian
EPSS Низкий

Описание

Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mediawikinot-affectedpackage

EPSS

Процентиль: 82%
0.01655
Низкий

Связанные уязвимости

ubuntu
около 20 лет назад

Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.

nvd
около 20 лет назад

Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.

github
почти 4 года назад

Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.

EPSS

Процентиль: 82%
0.01655
Низкий