Логотип exploitDog
bind: "CVE-2023-4448"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-4448"

Количество 4

Количество 4

nvd логотип

CVE-2023-4448

больше 2 лет назад

A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier VDB-237569 was assigned to this vulnerability.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-2r4q-h9qr-qqjp

больше 2 лет назад

A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier VDB-237569 was assigned to this vulnerability.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2024-02408

больше 2 лет назад

Уязвимость сценария dmin/run-movepass.php CMS-системы OpenRapid RapidCMS, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.8
EPSS: Низкий
redos логотип

ROS-20240329-10

почти 2 года назад

Множественные уязвимости cri-o

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-4448

A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier VDB-237569 was assigned to this vulnerability.

CVSS3: 6.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-2r4q-h9qr-qqjp

A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier VDB-237569 was assigned to this vulnerability.

CVSS3: 6.3
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2024-02408

Уязвимость сценария dmin/run-movepass.php CMS-системы OpenRapid RapidCMS, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
redos логотип
ROS-20240329-10

Множественные уязвимости cri-o

CVSS3: 9.8
почти 2 года назад

Уязвимостей на страницу