Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3m69-p4vj-fwj2

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Grayscale Blog 0.8.0, and possibly earlier versions, allows remote attackers to gain privileges via direct requests with modified arguments in (1) the user_permissions parameter to add_users.php, and unspecified parameters to (2) addblog.php, (3) editblog.php, (4) editlinks.php, (5) edit_users.php, and (6) add_links.php.

Grayscale Blog 0.8.0, and possibly earlier versions, allows remote attackers to gain privileges via direct requests with modified arguments in (1) the user_permissions parameter to add_users.php, and unspecified parameters to (2) addblog.php, (3) editblog.php, (4) editlinks.php, (5) edit_users.php, and (6) add_links.php.

EPSS

Процентиль: 85%
0.02661
Низкий

Связанные уязвимости

nvd
почти 19 лет назад

Grayscale Blog 0.8.0, and possibly earlier versions, allows remote attackers to gain privileges via direct requests with modified arguments in (1) the user_permissions parameter to add_users.php, and unspecified parameters to (2) addblog.php, (3) editblog.php, (4) editlinks.php, (5) edit_users.php, and (6) add_links.php.

EPSS

Процентиль: 85%
0.02661
Низкий