Описание
Unspecified vulnerability in phpScheduleIt 1.2.0 through 1.2.9, when useLogonName is enabled, allows remote attackers with administrator email address knowledge to bypass restrictions and gain privileges via unspecified vectors related to login names. NOTE: some of these details are obtained from third party information.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:brickhost:phpscheduleit:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:brickhost:phpscheduleit:1.2.0:beta:*:*:*:*:*:*
cpe:2.3:a:brickhost:phpscheduleit:1.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:brickhost:phpscheduleit:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:brickhost:phpscheduleit:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:brickhost:phpscheduleit:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:brickhost:phpscheduleit:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:brickhost:phpscheduleit:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:brickhost:phpscheduleit:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:brickhost:phpscheduleit:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:brickhost:phpscheduleit:1.2.9:*:*:*:*:*:*:*
EPSS
Процентиль: 33%
0.00133
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
почти 4 года назад
Unspecified vulnerability in phpScheduleIt 1.2.0 through 1.2.9, when useLogonName is enabled, allows remote attackers with administrator email address knowledge to bypass restrictions and gain privileges via unspecified vectors related to login names. NOTE: some of these details are obtained from third party information.
EPSS
Процентиль: 33%
0.00133
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-264