Логотип exploitDog
bind:CVE-2010-5084
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2010-5084

Количество 2

Количество 2

nvd логотип

CVE-2010-5084

почти 14 лет назад

The cross-site request forgery (CSRF) protection mechanism in e107 before 0.7.23 uses a predictable random token based on the creation date of the administrator account, which allows remote attackers to hijack the authentication of administrators for requests that add new users via e107_admin/users.php.

CVSS2: 6
EPSS: Низкий
github логотип

GHSA-7mf6-c4gc-7p3h

больше 3 лет назад

The cross-site request forgery (CSRF) protection mechanism in e107 before 0.7.23 uses a predictable random token based on the creation date of the administrator account, which allows remote attackers to hijack the authentication of administrators for requests that add new users via e107_admin/users.php.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2010-5084

The cross-site request forgery (CSRF) protection mechanism in e107 before 0.7.23 uses a predictable random token based on the creation date of the administrator account, which allows remote attackers to hijack the authentication of administrators for requests that add new users via e107_admin/users.php.

CVSS2: 6
0%
Низкий
почти 14 лет назад
github логотип
GHSA-7mf6-c4gc-7p3h

The cross-site request forgery (CSRF) protection mechanism in e107 before 0.7.23 uses a predictable random token based on the creation date of the administrator account, which allows remote attackers to hijack the authentication of administrators for requests that add new users via e107_admin/users.php.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу