Описание
login.php in Interact 2.1.1 generates different responses depending on whether or not a username is valid, which allows remote attackers to determine valid usernames. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.1.1 (включая)
Одно из
cpe:2.3:a:interact:interact:*:*:*:*:*:*:*:*
cpe:2.3:a:interact:interact:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:interact:interact:1.9:*:*:*:*:*:*:*
cpe:2.3:a:interact:interact:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:interact:interact:2.0:*:*:*:*:*:*:*
cpe:2.3:a:interact:interact:2.1:*:*:*:*:*:*:*
EPSS
Процентиль: 60%
0.00404
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
login.php in Interact 2.1.1 generates different responses depending on whether or not a username is valid, which allows remote attackers to determine valid usernames. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
EPSS
Процентиль: 60%
0.00404
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other