Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4w9p-gpm7-68jj

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the "ad_click" word in the query string, as demonstrated via the kala parameter.

PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the "ad_click" word in the query string, as demonstrated via the kala parameter.

EPSS

Процентиль: 4%
0.00018
Низкий

Связанные уязвимости

nvd
почти 20 лет назад

PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the "ad_click" word in the query string, as demonstrated via the kala parameter.

EPSS

Процентиль: 4%
0.00018
Низкий