Логотип exploitDog
bind:CVE-2013-6129
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-6129

Количество 2

Количество 2

nvd логотип

CVE-2013-6129

больше 12 лет назад

The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.

CVSS2: 7.5
EPSS: Высокий
github логотип

GHSA-rj2v-jjj7-r36g

больше 3 лет назад

The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.

EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-6129

The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.

CVSS2: 7.5
74%
Высокий
больше 12 лет назад
github логотип
GHSA-rj2v-jjj7-r36g

The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.

74%
Высокий
больше 3 лет назад

Уязвимостей на страницу