Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pccq-v233-rx3q

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.

Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.

EPSS

Процентиль: 100%
0.93865
Критический

Дефекты

CWE-20

Связанные уязвимости

nvd
около 10 лет назад

Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.

EPSS

Процентиль: 100%
0.93865
Критический

Дефекты

CWE-20