Lucene search

K
githubexploitF8DD707A-436A-56EF-A4A0-51A273512CC6
HistoryJan 31, 2024 - 3:00 p.m.

Exploit for Cross-Site Request Forgery (CSRF) in Moxa Iologik E1210 Firmware

2024-01-3115:00:16
208
cross-site request forgery
moxa iologik e1210 firmware
python script
nuclei template
cve-2023-5961
moxa security advisory mpsa-235250
unauthorized access
security issues
web server vulnerability
iologik e1212
configuration file
http responses
educational purposes
informational purposes

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7

Confidence

Low

EPSS

0.001

Percentile

24.1%

This repository contains a Python script and a nuclei template d…

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7

Confidence

Low

EPSS

0.001

Percentile

24.1%

Related for F8DD707A-436A-56EF-A4A0-51A273512CC6