MediaWiki before 1.5.4 uses a hard-coded "internal placeholder string", which allows remote attackers to bypass protection against cross-site scripting (XSS) attacks and execute Javascript using inline style attributes, which are processed by Internet Explorer.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html - | |
References | () http://secunia.com/advisories/18219 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18717 - | |
References | () http://www.mediawiki.org/wiki/Download - Patch | |
References | () http://www.securityfocus.com/bid/16032 - Patch | |
References | () http://www.vupen.com/english/advisories/2005/3059 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/23882 - |
Information
Published : 2005-12-22 21:03
Updated : 2024-11-21 00:04
NVD link : CVE-2005-4501
Mitre link : CVE-2005-4501
CVE.ORG link : CVE-2005-4501
JSON object : View
Products Affected
mediawiki
- mediawiki
CWE