6.8
CVSSv2

CVE-2009-4092

Published: 29/11/2009 Updated: 17/08/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 686
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Cross-site request forgery (CSRF) vulnerability in user.php in Simplog 0.9.3.2, and possibly earlier, allows remote malicious users to hijack the authentication of administrators and users for requests that change passwords.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

simplog simplog 0.9.3.2

Exploits

################################################################################ Mutliple Vulnerabilities in Simplog v0932 Name Multiple vulnerabilities in Simplog Systems Affected Simplog 0932 and possibly earlier versions Download sourceforgenet/projects/simplog/files/simplog/0932/simplog-0932targz/download Author Amol Naik ...

Github Repositories

Tool for searching Exploits from Exploit Databases, etc.

go-exploitdb This is a tool for searching Exploits from some Exploit Databases Exploits are inserted at sqlite database(go-exploitdb) can be searched by command line interface In server mode, a simple Web API can be used As the following vulnerabilities database ExploitDB(OffensiveSecurity) by CVE number or Exploit Database ID GitHub Repositories Awesome Cve Poc i

Tool for searching Exploits from Exploit Databases, etc.

go-exploitdb This is a tool for searching Exploits from some Exploit Databases Exploits are inserted at sqlite database(go-exploitdb) can be searched by command line interface In server mode, a simple Web API can be used As the following vulnerabilities database ExploitDB(OffensiveSecurity) by CVE number or Exploit Database ID GitHub Repositories Awesome Cve Poc i

Setup, exploit and patch for CVE-2009-4092 Simplog CSRF

Simplog-Exploit This repository contains the setup, exploit and patch for CVE-2009-4092 Simplog CSRF Vulnerability The vulnerabily exists in the userphp file of Simplog 0932, a web application used for providing people with an easy way to create and maintain a blog on their personal websites Attackers can use cross-site request forgery (CSRF) to hijack the user authentica