Логотип exploitDog
bind:CVE-2019-16133
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-16133

Количество 2

Количество 2

nvd логотип

CVE-2019-16133

больше 6 лет назад

An issue was discovered in eteams OA v4.0.34. Because the session is not strictly checked, the account names and passwords of all employees in the company can be obtained by an ordinary account. Specifically, the attacker sends a jsessionid value for URIs under app/profile/summary/.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-9jw4-qc44-f778

больше 3 лет назад

An issue was discovered in eteams OA v4.0.34. Because the session is not strictly checked, the account names and passwords of all employees in the company can be obtained by an ordinary account. Specifically, the attacker sends a jsessionid value for URIs under app/profile/summary/.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-16133

An issue was discovered in eteams OA v4.0.34. Because the session is not strictly checked, the account names and passwords of all employees in the company can be obtained by an ordinary account. Specifically, the attacker sends a jsessionid value for URIs under app/profile/summary/.

CVSS3: 6.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-9jw4-qc44-f778

An issue was discovered in eteams OA v4.0.34. Because the session is not strictly checked, the account names and passwords of all employees in the company can be obtained by an ordinary account. Specifically, the attacker sends a jsessionid value for URIs under app/profile/summary/.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу