Vulnerability Description
Unspecified vulnerability in phpScheduleIt 1.2.0 through 1.2.9, when useLogonName is enabled, allows remote attackers with administrator email address knowledge to bypass restrictions and gain privileges via unspecified vectors related to login names. NOTE: some of these details are obtained from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Brickhost | Phpscheduleit | 1.2.0 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/31147Vendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=614202
- http://www.securityfocus.com/bid/30300
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43900
- http://secunia.com/advisories/31147Vendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=614202
- http://www.securityfocus.com/bid/30300
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43900
FAQ
What is CVE-2008-3268?
CVE-2008-3268 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Unspecified vulnerability in phpScheduleIt 1.2.0 through 1.2.9, when useLogonName is enabled, allows remote attackers with administrator email address knowledge to bypass restrictions and gain privile...
How severe is CVE-2008-3268?
CVE-2008-3268 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3268?
Check the references section above for vendor advisories and patch information. Affected products include: Brickhost Phpscheduleit.