CVE-2012-438513.11.2019, 17:15letodms 3.3.6 has CSRF via change passwordCSRFEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST6.5 MEDIUMNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NredhatCNA------CVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 45%VendorProductVersiontrilexnetletodms3.3.6debiandebian_linux8.0𝑥= Vulnerable software versionsUbuntu ReleasesUbuntu ProductCodenameletodmszestynot-affectedyakketynot-affectedxenialnot-affectedwilynot-affectedvividnot-affectedutopicnot-affectedtrustydnesaucynot-affectedraringnot-affectedquantalignoredpreciseignoredoneiricignorednattydneluciddnehardydneKnown Exploits!https://vulmon.com/exploitdetails?qidtp=EDB&qid=20759https://vulmon.com/exploitdetails?qidtp=EDB&qid=20759Common Weakness EnumerationCWE-352 - Cross-Site Request Forgery (CSRF)The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Referenceshttp://www.openwall.com/lists/oss-security/2012/08/31/19https://security-tracker.debian.org/tracker/CVE-2012-4385https://vulmon.com/exploitdetails?qidtp=EDB&qid=20759http://www.openwall.com/lists/oss-security/2012/08/31/19https://security-tracker.debian.org/tracker/CVE-2012-4385https://vulmon.com/exploitdetails?qidtp=EDB&qid=20759