- Description
- The web application is not protected against cross-site request forgery attacks. Therefore, an attacker can trick users into performing actions on the application when they visit an attacker-controlled website or click on a malicious link. E.g. an attacker can forge malicious links to reset the admin password or create new users.
- Source
- 551230f0-3615-47bd-b7cc-93e92e730bbf
- NVD status
- Received
CVSS 3.1
- Type
- Secondary
- Base score
- 6.3
- Impact score
- 3.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
- Severity
- MEDIUM
- 551230f0-3615-47bd-b7cc-93e92e730bbf
- CWE-352
- Hype score
- Not currently trending
CVE-2024-28141 The web application is not protected against cross-site request forgery attacks. Therefore, an attacker can trick users into performing actions on the application whe… https://t.co/ABTSkZcYmi
@CVEnew
15 Dec 2024
479 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-28141 SEC Consult SA-20241204-0 : Multiple Critical Vulnerabil... https://t.co/k2E0OG05ye Don't wait vulnerability scanning results: https://t.co/oh1APvMMnd
@VulmonFeeds
5 Dec 2024
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes