Количество 5
Количество 5
CVE-2025-2123
A vulnerability, which was classified as problematic, has been found in GeSHi up to 1.0.9.1. Affected by this issue is the function get_var of the file /contrib/cssgen.php of the component CSS Handler. The manipulation of the argument default-styles/keywords-1/keywords-2/keywords-3/keywords-4/comments leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-2123
A vulnerability, which was classified as problematic, has been found in GeSHi up to 1.0.9.1. Affected by this issue is the function get_var of the file /contrib/cssgen.php of the component CSS Handler. The manipulation of the argument default-styles/keywords-1/keywords-2/keywords-3/keywords-4/comments leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-2123
A vulnerability, which was classified as problematic, has been found i ...
GHSA-pr6q-g5gv-qgr7
GeSHi XSS possible in the get_var function of /contrib/cssgen.php
BDU:2026-00156
Уязвимость функции get_var библиотеки для подсветки синтаксиса в исходном коде GeSHi, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-2123 A vulnerability, which was classified as problematic, has been found in GeSHi up to 1.0.9.1. Affected by this issue is the function get_var of the file /contrib/cssgen.php of the component CSS Handler. The manipulation of the argument default-styles/keywords-1/keywords-2/keywords-3/keywords-4/comments leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 3.5 | 0% Низкий | 11 месяцев назад | |
CVE-2025-2123 A vulnerability, which was classified as problematic, has been found in GeSHi up to 1.0.9.1. Affected by this issue is the function get_var of the file /contrib/cssgen.php of the component CSS Handler. The manipulation of the argument default-styles/keywords-1/keywords-2/keywords-3/keywords-4/comments leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 3.5 | 0% Низкий | 11 месяцев назад | |
CVE-2025-2123 A vulnerability, which was classified as problematic, has been found i ... | CVSS3: 3.5 | 0% Низкий | 11 месяцев назад | |
GHSA-pr6q-g5gv-qgr7 GeSHi XSS possible in the get_var function of /contrib/cssgen.php | CVSS3: 3.5 | 0% Низкий | 11 месяцев назад | |
BDU:2026-00156 Уязвимость функции get_var библиотеки для подсветки синтаксиса в исходном коде GeSHi, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS) | CVSS3: 3.5 | 0% Низкий | 11 месяцев назад |
Уязвимостей на страницу