Vulnerabilities
Vulnerable Software
Redhat:  >> Luci  Security Vulnerabilities
Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors.
CVSS Score
7.5
EPSS Score
0.014
Published
2011-02-03
The default configuration of Luci 0.22.4 and earlier in Red Hat Conga uses "[INSERT SECRET HERE]" as its secret key for cookies, which makes it easier for remote attackers to bypass repoze.who authentication via a forged ticket cookie.
CVSS Score
6.4
EPSS Score
0.007
Published
2010-11-06


Contact Us

Shodan ® - All rights reserved