Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rj2v-jjj7-r36g

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.

The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.

EPSS

Процентиль: 99%
0.74425
Высокий

Связанные уязвимости

nvd
больше 12 лет назад

The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.

EPSS

Процентиль: 99%
0.74425
Высокий