Количество 4
Количество 4
CVE-2005-4031
Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.
CVE-2005-4031
Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.
CVE-2005-4031
Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows re ...
GHSA-7g9f-9vq9-79j8
Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2005-4031 Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function. | CVSS2: 7.5 | 2% Низкий | почти 20 лет назад | |
CVE-2005-4031 Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function. | CVSS2: 7.5 | 2% Низкий | почти 20 лет назад | |
CVE-2005-4031 Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows re ... | CVSS2: 7.5 | 2% Низкий | почти 20 лет назад | |
GHSA-7g9f-9vq9-79j8 Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function. | 2% Низкий | больше 3 лет назад |
Уязвимостей на страницу