Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-38h6-xf6r-fw6f

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

MediaWiki before 1.5.4 uses a hard-coded "internal placeholder string", which allows remote attackers to bypass protection against cross-site scripting (XSS) attacks and execute Javascript using inline style attributes, which are processed by Internet Explorer.

MediaWiki before 1.5.4 uses a hard-coded "internal placeholder string", which allows remote attackers to bypass protection against cross-site scripting (XSS) attacks and execute Javascript using inline style attributes, which are processed by Internet Explorer.

EPSS

Процентиль: 68%
0.00572
Низкий

Связанные уязвимости

nvd
почти 20 лет назад

MediaWiki before 1.5.4 uses a hard-coded "internal placeholder string", which allows remote attackers to bypass protection against cross-site scripting (XSS) attacks and execute Javascript using inline style attributes, which are processed by Internet Explorer.

debian
почти 20 лет назад

MediaWiki before 1.5.4 uses a hard-coded "internal placeholder string" ...

EPSS

Процентиль: 68%
0.00572
Низкий