Multiple cross-site request forgery (CSRF) vulnerabilities in Php Scriptlerim Who's Who script allow remote attackers to hijack the authentication of administrators or requests that (1) add an admin account via a request to filepath/yonetim/plugin/adminsave.php or have unspecified impact via a request to (2) ayarsave.php, (3) uyesave.php, (4) slaytadd.php, or (5) slaytsave.php.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 02:19
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/129102/Whos-Who-Script-Cross-Site-Request-Forgery.html - Exploit | |
| References | () http://www.exploit-db.com/exploits/35129 - Exploit | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/98631 - | 
Information
                Published : 2014-11-17 16:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-8953
Mitre link : CVE-2014-8953
CVE.ORG link : CVE-2014-8953
JSON object : View
Products Affected
                phpscriptlerim
- php_scriptlerim_who\'s_who
 
CWE
                
                    
                        
                        CWE-352
                        
            Cross-Site Request Forgery (CSRF)
