Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cvpj-w72w-rchg

Опубликовано: 20 янв. 2022
Источник: github
Github: Не прошло ревью

Описание

As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=" to successfully execute the JavaScript payload present in the "ref" URL parameter.

As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=" to successfully execute the JavaScript payload present in the "ref" URL parameter.

EPSS

Процентиль: 95%
0.21043
Средний

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 4 лет назад

As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.

CVSS3: 6.1
nvd
около 4 лет назад

As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.

CVSS3: 6.1
debian
около 4 лет назад

As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_c ...

EPSS

Процентиль: 95%
0.21043
Средний

Дефекты

CWE-79