Логотип exploitDog
bind:CVE-2008-3268
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2008-3268

Количество 2

Количество 2

nvd логотип

CVE-2008-3268

больше 17 лет назад

Unspecified vulnerability in phpScheduleIt 1.2.0 through 1.2.9, when useLogonName is enabled, allows remote attackers with administrator email address knowledge to bypass restrictions and gain privileges via unspecified vectors related to login names. NOTE: some of these details are obtained from third party information.

CVSS2: 6.8
EPSS: Низкий
github логотип

GHSA-vqmc-89mm-v3q9

почти 4 года назад

Unspecified vulnerability in phpScheduleIt 1.2.0 through 1.2.9, when useLogonName is enabled, allows remote attackers with administrator email address knowledge to bypass restrictions and gain privileges via unspecified vectors related to login names. NOTE: some of these details are obtained from third party information.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2008-3268

Unspecified vulnerability in phpScheduleIt 1.2.0 through 1.2.9, when useLogonName is enabled, allows remote attackers with administrator email address knowledge to bypass restrictions and gain privileges via unspecified vectors related to login names. NOTE: some of these details are obtained from third party information.

CVSS2: 6.8
0%
Низкий
больше 17 лет назад
github логотип
GHSA-vqmc-89mm-v3q9

Unspecified vulnerability in phpScheduleIt 1.2.0 through 1.2.9, when useLogonName is enabled, allows remote attackers with administrator email address knowledge to bypass restrictions and gain privileges via unspecified vectors related to login names. NOTE: some of these details are obtained from third party information.

0%
Низкий
почти 4 года назад

Уязвимостей на страницу