← Volver a CVEs
CVE-2005-4031
N/ADescripcion
Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado12/6/2005
Ultima modificacion4/16/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
mediawiki:mediawiki
Referencias
http://secunia.com/advisories/17866(cve@mitre.org)
http://www.kb.cert.org/vuls/id/392156(cve@mitre.org)
http://www.securityfocus.com/bid/15703(cve@mitre.org)
http://www.vupen.com/english/advisories/2005/2726(cve@mitre.org)
http://secunia.com/advisories/17866(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/project/shownotes.php?group_id=34373&release_id=375755(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/392156(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/15703(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2005/2726(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.