Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gfhh-v76q-rhrx

Опубликовано: 12 янв. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.3
CVSS3: 3.5

Описание

A vulnerability, which was classified as problematic, was found in reckcn SPPanAdmin 1.0. Affected is an unknown function of the file /;/admin/role/edit. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability, which was classified as problematic, was found in reckcn SPPanAdmin 1.0. Affected is an unknown function of the file /;/admin/role/edit. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 29%
0.00104
Низкий

5.3 Medium

CVSS4

3.5 Low

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 3.5
nvd
около 1 года назад

A vulnerability, which was classified as problematic, was found in reckcn SPPanAdmin 1.0. Affected is an unknown function of the file /;/admin/role/edit. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 29%
0.00104
Низкий

5.3 Medium

CVSS4

3.5 Low

CVSS3

Дефекты

CWE-79