Published: 07/06/2021 Updated: 09/06/2021
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Cross Site Request Forgery (CSRF) in Simple-Log v1.6 allows remote malicious users to gain privilege and execute arbitrary code via the component "Simple-Log/admin/admin.php?act=act_edit_member".

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

simple-log project simple-log 1.6

Github Repositories

Use at your own risk CVE-2020-18264 Exploit Windows Binary PoC /CVE-2020-18264exe will run the exploit /CVE-2020-18264exe Target IP /CVE-2020-18264exe wwwexamplecom Running the exploit on Linux Change the target IP in CVE-2020-18264sh then do: chmod +x CVE-2020-18264sh /CVE-2020-18264sh Target IP /CVE-2020-18264sh wwwexam