Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jxgr-72v4-fxfc

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

dynaliens 2.0 and 2.1 allows remote attackers to bypass authentication and perform certain privileged actions via a direct request for (1) validlien.php3 (2) supprlien.php3 (3) supprub.php3 (4) validlien.php3 (5) confsuppr.php3 (6) modiflien.php3, or (7) confmodif.php3 in admin/.

dynaliens 2.0 and 2.1 allows remote attackers to bypass authentication and perform certain privileged actions via a direct request for (1) validlien.php3 (2) supprlien.php3 (3) supprub.php3 (4) validlien.php3 (5) confsuppr.php3 (6) modiflien.php3, or (7) confmodif.php3 in admin/.

EPSS

Процентиль: 46%
0.00235
Низкий

Связанные уязвимости

nvd
почти 19 лет назад

dynaliens 2.0 and 2.1 allows remote attackers to bypass authentication and perform certain privileged actions via a direct request for (1) validlien.php3 (2) supprlien.php3 (3) supprub.php3 (4) validlien.php3 (5) confsuppr.php3 (6) modiflien.php3, or (7) confmodif.php3 in admin/.

EPSS

Процентиль: 46%
0.00235
Низкий