Логотип exploitDog
bind:CVE-2019-13338
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-13338

Количество 2

Количество 2

nvd логотип

CVE-2019-13338

больше 6 лет назад

In WESEEK GROWI before 3.5.0, a remote attacker can obtain the password hash of the creator of a page by leveraging wiki access to make API calls for page metadata. In other words, the password hash can be retrieved even though it is not a publicly available field.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-v36f-499j-895j

больше 3 лет назад

In WESEEK GROWI before 3.5.0, a remote attacker can obtain the password hash of the creator of a page by leveraging wiki access to make API calls for page metadata. In other words, the password hash can be retrieved even though it is not a publicly available field.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-13338

In WESEEK GROWI before 3.5.0, a remote attacker can obtain the password hash of the creator of a page by leveraging wiki access to make API calls for page metadata. In other words, the password hash can be retrieved even though it is not a publicly available field.

CVSS3: 7.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-v36f-499j-895j

In WESEEK GROWI before 3.5.0, a remote attacker can obtain the password hash of the creator of a page by leveraging wiki access to make API calls for page metadata. In other words, the password hash can be retrieved even though it is not a publicly available field.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу