EPSS
Percentile
65.4%
alextselegidis/easyappointments is vulnerable to Authentication Bypass. The vulnerability exists due to the use of hard-coded credentials which allows an attacker to use the default password and bypass the login.
github.com/advisories/GHSA-347f-rxg8-qgrv
github.com/alextselegidis/easyappointments/commit/2731d2f17c5140c562426b857e9f5d63da5c4593
huntr.dev/bounties/91c31eb6-024d-4ad3-88fe-f15b03fd20f5
huntr.dev/bounties/91c31eb6-024d-4ad3-88fe-f15b03fd20f5/