Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xhhc-3m45-f6cf

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The cross-site scripting (XSS) countermeasures in class.inputfilter.php in Joomla! 1.0.7 allow remote attackers to cause a denial of service via a crafted mosmsg parameter to index.php with a malformed sequence of multiple tags, as demonstrated using "<<>AAA<><>", possibly due to nested or empty tags.

The cross-site scripting (XSS) countermeasures in class.inputfilter.php in Joomla! 1.0.7 allow remote attackers to cause a denial of service via a crafted mosmsg parameter to index.php with a malformed sequence of multiple tags, as demonstrated using "<<>AAA<><>", possibly due to nested or empty tags.

EPSS

Процентиль: 24%
0.0008
Низкий

Связанные уязвимости

nvd
почти 20 лет назад

The cross-site scripting (XSS) countermeasures in class.inputfilter.php in Joomla! 1.0.7 allow remote attackers to cause a denial of service via a crafted mosmsg parameter to index.php with a malformed sequence of multiple tags, as demonstrated using "<<>AAA<><>", possibly due to nested or empty tags.

EPSS

Процентиль: 24%
0.0008
Низкий