Vulnerability Details CVE-2014-3781
The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 62.6%
CVSS Severity
CVSS v2 Score 5.8
Products affected by CVE-2014-3781
-
cpe:2.3:a:dotclear:dotclear:1.2.1
-
cpe:2.3:a:dotclear:dotclear:1.2.2
-
cpe:2.3:a:dotclear:dotclear:1.2.3
-
cpe:2.3:a:dotclear:dotclear:1.2.4
-
cpe:2.3:a:dotclear:dotclear:1.2.5
-
cpe:2.3:a:dotclear:dotclear:1.2.6
-
cpe:2.3:a:dotclear:dotclear:1.2.7
-
cpe:2.3:a:dotclear:dotclear:1.2.8
-
cpe:2.3:a:dotclear:dotclear:2.0
-
cpe:2.3:a:dotclear:dotclear:2.0.1
-
cpe:2.3:a:dotclear:dotclear:2.0.2
-
cpe:2.3:a:dotclear:dotclear:2.1
-
cpe:2.3:a:dotclear:dotclear:2.1.1
-
cpe:2.3:a:dotclear:dotclear:2.1.3
-
cpe:2.3:a:dotclear:dotclear:2.1.4
-
cpe:2.3:a:dotclear:dotclear:2.1.5
-
cpe:2.3:a:dotclear:dotclear:2.1.6
-
cpe:2.3:a:dotclear:dotclear:2.1.7
-
cpe:2.3:a:dotclear:dotclear:2.2
-
cpe:2.3:a:dotclear:dotclear:2.2.1
-
cpe:2.3:a:dotclear:dotclear:2.2.2
-
cpe:2.3:a:dotclear:dotclear:2.2.3
-
cpe:2.3:a:dotclear:dotclear:2.3.0
-
cpe:2.3:a:dotclear:dotclear:2.3.1
-
cpe:2.3:a:dotclear:dotclear:2.4
-
cpe:2.3:a:dotclear:dotclear:2.4.2
-
cpe:2.3:a:dotclear:dotclear:2.4.3
-
cpe:2.3:a:dotclear:dotclear:2.4.4
-
cpe:2.3:a:dotclear:dotclear:2.5.0
-
cpe:2.3:a:dotclear:dotclear:2.5.1
-
cpe:2.3:a:dotclear:dotclear:2.5.2
-
cpe:2.3:a:dotclear:dotclear:2.5.3
-
cpe:2.3:a:dotclear:dotclear:2.6
-
cpe:2.3:a:dotclear:dotclear:2.6.1
-
cpe:2.3:a:dotclear:dotclear:2.6.2