Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v4v9-w35g-h777

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The activation resend function in the Profiles module in XOOPS before 2.4.1 sends activation codes in response to arbitrary activation requests, which allows remote attackers to bypass administrative approval via a request involving activate.php.

The activation resend function in the Profiles module in XOOPS before 2.4.1 sends activation codes in response to arbitrary activation requests, which allows remote attackers to bypass administrative approval via a request involving activate.php.

EPSS

Процентиль: 50%
0.00264
Низкий

Связанные уязвимости

nvd
почти 16 лет назад

The activation resend function in the Profiles module in XOOPS before 2.4.1 sends activation codes in response to arbitrary activation requests, which allows remote attackers to bypass administrative approval via a request involving activate.php.

EPSS

Процентиль: 50%
0.00264
Низкий