जमा करें #721893: https://doc.cms.talelin.com/ Lin-CMS 0.6.0 weak passwordजानकारी

शीर्षकhttps://doc.cms.talelin.com/ Lin-CMS 0.6.0 weak password
विवरणLin CMS is a CMS solution that separates the front and back ends. Lin not only provides background support, but also has a corresponding front-end system. Lin currently has implementation in Python, Node.js and Java versions. The tests folder is a file used by developers for testing, and the config.py file exists in the tests folder.This file contains the administrator's default account and password.Due to the failure to delete and clean up in time, a security risk was left behind. Attackers can directly log in with the default administrator account and password that have not been cleared, gain control of the account, and thus face high risks such as complete system takeover and leakage of sensitive information.
स्रोत⚠️ https://github.com/m3ngx1ng/cve/blob/4690d4020a4a642af4c50912f762937292228641/lin-cms.md
उपयोगकर्ता
 m3x1 (UID 92411)
सबमिशन23/12/2025 10:22 AM (4 महीनों पहले)
संयम27/12/2025 02:55 PM (4 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि338528 [TaleLin Lin-CMS तक 0.6.0 Tests Folder /tests/config.py username/password सूचना का प्रकटीकरण]
अंक20

Want to know what is going to be exploited?

We predict KEV entries!