Логотип exploitDog
bind:CVE-2020-25828
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-25828

Количество 6

Количество 6

ubuntu логотип

CVE-2020-25828

больше 5 лет назад

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2020-25828

больше 5 лет назад

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2020-25828

больше 5 лет назад

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2020-25828

больше 5 лет назад

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through ...

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-h8qx-mj6v-2934

больше 3 лет назад

MediaWiki Cross-site Scripting (XSS) vulnerability

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2022-07044

больше 5 лет назад

Уязвимость функции mw.message.parse() программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-25828

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)

CVSS3: 6.1
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-25828

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)

CVSS3: 6.1
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-25828

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)

CVSS3: 6.1
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-25828

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through ...

CVSS3: 6.1
0%
Низкий
больше 5 лет назад
github логотип
GHSA-h8qx-mj6v-2934

MediaWiki Cross-site Scripting (XSS) vulnerability

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-07044

Уязвимость функции mw.message.parse() программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)

CVSS3: 6.1
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу