Логотип exploitDog
bind: "CVE-2023-4448"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-4448"

Количество 4

Количество 4

nvd логотип

CVE-2023-4448

почти 2 года назад

A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier VDB-237569 was assigned to this vulnerability.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-2r4q-h9qr-qqjp

почти 2 года назад

A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier VDB-237569 was assigned to this vulnerability.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2024-02408

почти 2 года назад

Уязвимость сценария dmin/run-movepass.php CMS-системы OpenRapid RapidCMS, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.8
EPSS: Низкий
redos логотип

ROS-20240329-10

около 1 года назад

Множественные уязвимости cri-o

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-4448

A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier VDB-237569 was assigned to this vulnerability.

CVSS3: 6.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-2r4q-h9qr-qqjp

A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier VDB-237569 was assigned to this vulnerability.

CVSS3: 6.3
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02408

Уязвимость сценария dmin/run-movepass.php CMS-системы OpenRapid RapidCMS, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.8
0%
Низкий
почти 2 года назад
redos логотип
ROS-20240329-10

Множественные уязвимости cri-o

CVSS3: 9.8
около 1 года назад

Уязвимостей на страницу