Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-67p5-4gjp-j4vw

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.

The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.

EPSS

Процентиль: 63%
0.00447
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
больше 11 лет назад

The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.

nvd
больше 11 лет назад

The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.

debian
больше 11 лет назад

The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclea ...

EPSS

Процентиль: 63%
0.00447
Низкий

Дефекты

CWE-287