Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gwpq-jg4g-7ww7

Опубликовано: 12 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 2.9
CVSS3: 3.7

Описание

A flaw has been found in projectsend up to r1945. This impacts an unknown function of the file includes/Classes/Auth.php. Executing a manipulation of the argument ldap_email can lead to observable response discrepancy. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitability is said to be difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

A flaw has been found in projectsend up to r1945. This impacts an unknown function of the file includes/Classes/Auth.php. Executing a manipulation of the argument ldap_email can lead to observable response discrepancy. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitability is said to be difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 11%
0.00038
Низкий

2.9 Low

CVSS4

3.7 Low

CVSS3

Дефекты

CWE-203

Связанные уязвимости

CVSS3: 3.7
nvd
30 дней назад

A flaw has been found in projectsend up to r1945. This impacts an unknown function of the file includes/Classes/Auth.php. Executing a manipulation of the argument ldap_email can lead to observable response discrepancy. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitability is said to be difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 11%
0.00038
Низкий

2.9 Low

CVSS4

3.7 Low

CVSS3

Дефекты

CWE-203