Логотип exploitDog
bind:CVE-2021-45821
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-45821

Количество 2

Количество 2

nvd логотип

CVE-2021-45821

почти 4 года назад

A blind SQL injection vulnerability exists in Xbtit 3.1 via the sid parameter in ajaxchat/getHistoryChatData.php file that is accessible by a registered user. As a result, a malicious user can extract sensitive data such as usernames and passwords and in some cases use this vulnerability in order to get a remote code execution on the remote web server.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-69rw-gr4q-mrm6

почти 4 года назад

A blind SQL injection vulnerability exists in Xbtit 3.1 via the sid parameter in ajaxchat/getHistoryChatData.php file that is accessible by a registered user. As a result, a malicious user can extract sensitive data such as usernames and passwords and in some cases use this vulnerability in order to get a remote code execution on the remote web server.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-45821

A blind SQL injection vulnerability exists in Xbtit 3.1 via the sid parameter in ajaxchat/getHistoryChatData.php file that is accessible by a registered user. As a result, a malicious user can extract sensitive data such as usernames and passwords and in some cases use this vulnerability in order to get a remote code execution on the remote web server.

CVSS3: 8.8
2%
Низкий
почти 4 года назад
github логотип
GHSA-69rw-gr4q-mrm6

A blind SQL injection vulnerability exists in Xbtit 3.1 via the sid parameter in ajaxchat/getHistoryChatData.php file that is accessible by a registered user. As a result, a malicious user can extract sensitive data such as usernames and passwords and in some cases use this vulnerability in order to get a remote code execution on the remote web server.

CVSS3: 8.8
2%
Низкий
почти 4 года назад

Уязвимостей на страницу