Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p8qr-ww3f-6mvm

Опубликовано: 15 янв. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 7.3

Описание

A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file /fladmin/user_recoverpwd.php. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file /fladmin/user_recoverpwd.php. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 40%
0.00185
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-1392

Связанные уязвимости

CVSS3: 7.3
nvd
около 1 года назад

A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file /fladmin/user_recoverpwd.php. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 40%
0.00185
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-1392