TadTools special page is vulnerable to authorization bypass, thus remote attackers can use the specific parameter to delete arbitrary files in the system without logging in.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-5174-6f1d5-1.html | Third Party Advisory |
https://www.twcert.org.tw/tw/cp-132-5174-6f1d5-1.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:27
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 7.5 |
References | () https://www.twcert.org.tw/tw/cp-132-5174-6f1d5-1.html - Third Party Advisory |
12 Aug 2022, 16:34
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-306 |
15 Oct 2021, 15:31
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:tadtools_project:tadtools:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 9.1 |
CWE | CWE-863 | |
References | (MISC) https://www.twcert.org.tw/tw/cp-132-5174-6f1d5-1.html - Third Party Advisory |
08 Oct 2021, 17:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-08 16:15
Updated : 2024-11-21 06:27
NVD link : CVE-2021-41975
Mitre link : CVE-2021-41975
CVE.ORG link : CVE-2021-41975
JSON object : View
Products Affected
tadtools_project
- tadtools