logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2023-50256

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2023-50256

Description:
Froxlor is open source server administration software. Prior to version 2.1.2, it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements (e.g. surname, company name) established by the system. Version 2.1.2 fixes this issue.
Last updated date:
01/10/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/10/2024
Reference url to background

https://github.com/Froxlor/Froxlor/security/advisories/GHSA-625g-fm5w-w7w4

Type:
exploit
Confidence:
HIGH
Date of publishing:
01/10/2024
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy