Логотип exploitDog
bind:CVE-2020-36999
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36999

Количество 2

Количество 2

nvd логотип

CVE-2020-36999

11 дней назад

Elaniin CMS 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard by manipulating the login page with SQL injection. Attackers can bypass authentication by sending crafted email and password parameters with '=''or' payload to login.php, granting unauthorized access to the system.

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-p5m8-h7p3-gmfx

11 дней назад

Elaniin CMS 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard by manipulating the login page with SQL injection. Attackers can bypass authentication by sending crafted email and password parameters with '=''or' payload to login.php, granting unauthorized access to the system.

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-36999

Elaniin CMS 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard by manipulating the login page with SQL injection. Attackers can bypass authentication by sending crafted email and password parameters with '=''or' payload to login.php, granting unauthorized access to the system.

CVSS3: 8.2
0%
Низкий
11 дней назад
github логотип
GHSA-p5m8-h7p3-gmfx

Elaniin CMS 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard by manipulating the login page with SQL injection. Attackers can bypass authentication by sending crafted email and password parameters with '=''or' payload to login.php, granting unauthorized access to the system.

CVSS3: 8.2
0%
Низкий
11 дней назад

Уязвимостей на страницу