| |
Vulnerability CVE-2015-4626
Published: 2017-01-23 Modified: 2017-01-24
Description: |
B.A.S C2Box before 4.0.0 (r19171) relies on client-side validation, which allows remote attackers to "corrupt the business logic" via a negative value in an overdraft. |
See advisories in our WLB2 database: | Topic | Author | Date |
Low |
| Harish Ramadoss | 28.03.2016 |
CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
5/10 |
2.9/10 |
10/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
Partial |
None |
References: |
https://packetstormsecurity.com/files/136450/C2Box-4.0.0-r19171-Validation-Bypass.html
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|