Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4fwj-v7f6-pq59

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple eval injection vulnerabilities in the com_search component in Joomla! 1.5 beta before RC1 (aka Mapya) allow remote attackers to execute arbitrary PHP code via PHP sequences in the searchword parameter, related to default_results.php in (1) components/com_search/views/search/tmpl/ and (2) templates/beez/html/com_search/search/.

Multiple eval injection vulnerabilities in the com_search component in Joomla! 1.5 beta before RC1 (aka Mapya) allow remote attackers to execute arbitrary PHP code via PHP sequences in the searchword parameter, related to default_results.php in (1) components/com_search/views/search/tmpl/ and (2) templates/beez/html/com_search/search/.

EPSS

Процентиль: 92%
0.08644
Низкий

Дефекты

CWE-94

Связанные уязвимости

nvd
больше 18 лет назад

Multiple eval injection vulnerabilities in the com_search component in Joomla! 1.5 beta before RC1 (aka Mapya) allow remote attackers to execute arbitrary PHP code via PHP sequences in the searchword parameter, related to default_results.php in (1) components/com_search/views/search/tmpl/ and (2) templates/beez/html/com_search/search/.

EPSS

Процентиль: 92%
0.08644
Низкий

Дефекты

CWE-94