Количество 4
Количество 4
CVE-2021-26247
As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.
CVE-2021-26247
As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.
CVE-2021-26247
As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_c ...
GHSA-cvpj-w72w-rchg
As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-26247 As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter. | CVSS3: 6.1 | 21% Средний | около 4 лет назад | |
CVE-2021-26247 As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter. | CVSS3: 6.1 | 21% Средний | около 4 лет назад | |
CVE-2021-26247 As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_c ... | CVSS3: 6.1 | 21% Средний | около 4 лет назад | |
GHSA-cvpj-w72w-rchg As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter. | 21% Средний | около 4 лет назад |
Уязвимостей на страницу