Логотип exploitDog
bind:CVE-2019-5433
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-5433

Количество 2

Количество 2

nvd логотип

CVE-2019-5433

почти 7 лет назад

A user having access to the UI of a Revive Adserver instance could be tricked into clicking on a specifically crafted admin account-switch.php URL that would eventually lead them to another (unsafe) domain, potentially used for stealing credentials or other phishing attacks. This vulnerability was addressed in version 4.2.0.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-fq53-5rcc-2cj7

больше 3 лет назад

A user having access to the UI of a Revive Adserver instance could be tricked into clicking on a specifically crafted admin account-switch.php URL that would eventually lead them to another (unsafe) domain, potentially used for stealing credentials or other phishing attacks. This vulnerability was addressed in version 4.2.0.

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-5433

A user having access to the UI of a Revive Adserver instance could be tricked into clicking on a specifically crafted admin account-switch.php URL that would eventually lead them to another (unsafe) domain, potentially used for stealing credentials or other phishing attacks. This vulnerability was addressed in version 4.2.0.

CVSS3: 5.4
0%
Низкий
почти 7 лет назад
github логотип
GHSA-fq53-5rcc-2cj7

A user having access to the UI of a Revive Adserver instance could be tricked into clicking on a specifically crafted admin account-switch.php URL that would eventually lead them to another (unsafe) domain, potentially used for stealing credentials or other phishing attacks. This vulnerability was addressed in version 4.2.0.

CVSS3: 5.4
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу