Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jvmv-fm55-2267

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

LiveZilla before 5.1.2.1 includes the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which might allow remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack.

LiveZilla before 5.1.2.1 includes the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which might allow remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack.

EPSS

Процентиль: 48%
0.0025
Низкий

Связанные уязвимости

nvd
больше 11 лет назад

LiveZilla before 5.1.2.1 includes the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which might allow remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack.

EPSS

Процентиль: 48%
0.0025
Низкий