" in the tag with a "<", which bypasses the regular expressions that sanitize the data, but is automatically corrected by many web browsers. NOTE: it could be argued that this vulnerability is due to a design limitation of many web browsers; if so, then this should not be treated as a vulnerability in PHP-Nuke.">
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 4.3 | AV:N/AC:M/Au:N/C:N/I:P/A:N | nvd@nist.gov |
Publication date : 2005-12-13 23h00 +00:00
Author : Maksymilian Arciemowicz
EDB Verified : Yes
Francisco_burzi>>Php-nuke >> Version 7.0
Francisco_burzi>>Php-nuke >> Version 7.1
Francisco_burzi>>Php-nuke >> Version 7.2
Francisco_burzi>>Php-nuke >> Version 7.3
Francisco_burzi>>Php-nuke >> Version 7.6
Francisco_burzi>>Php-nuke >> Version 7.7
Francisco_burzi>>Php-nuke >> Version 7.8
Francisco_burzi>>Php-nuke >> Version 7.9