Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hvcx-qqg5-776h

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

JRequest in Joomla! 1.5 before 1.5.7 does not sanitize variables that were set with JRequest::setVar, which allows remote attackers to conduct "variable injection" attacks and have unspecified other impact.

JRequest in Joomla! 1.5 before 1.5.7 does not sanitize variables that were set with JRequest::setVar, which allows remote attackers to conduct "variable injection" attacks and have unspecified other impact.

EPSS

Процентиль: 52%
0.00289
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
больше 17 лет назад

JRequest in Joomla! 1.5 before 1.5.7 does not sanitize variables that were set with JRequest::setVar, which allows remote attackers to conduct "variable injection" attacks and have unspecified other impact.

EPSS

Процентиль: 52%
0.00289
Низкий

Дефекты

CWE-20