Логотип exploitDog
bind:CVE-2017-15304
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-15304

Количество 2

Количество 2

nvd логотип

CVE-2017-15304

больше 8 лет назад

/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-q3g5-ggf3-c63g

больше 3 лет назад

/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-15304

/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change.

CVSS3: 9.8
0%
Низкий
больше 8 лет назад
github логотип
GHSA-q3g5-ggf3-c63g

/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change.

CVSS3: 9.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу