AriaNg v0.1.0~v1.2.2 is affected by an incorrect access control vulnerability through not authenticating visitors' access rights.
9.8critical severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
15/06/2022
Products1
Ar
Ariang
by Ariang Project
2 Versions
a year ago
Vulnerability Categories2
Improper Authentication
Missing Authentication for Critical Function
xTags 6
#easy_to_exploit
#critical_vulnerability
#known_vulnerability
#confidentiality_impact_if_exploited
#integrity_impact_if_exploited
#availability_impact_if_exploited
Advisory Links1
https://github.com/Amozing/Am0zang/issues/1
http://www.vicarius.io
is owned and operated by Vicarius Ltd. (the āCompanyā). All information contained on the
Website is purely for informational, and educational purposes and should be independently
verified and confirmed. Vicarius does not accept any liability for any loss or damage
whatsoever caused in reliance upon such information or services. No statements or information
presented in any form by Vicarius is intended as fact, and you agree that you will not
consider the statements or information presented on the Website as fact or as a guarantee of
performance.
Related CVEs
Security Research Topics
By Vicarius Cartoons
Apr 12, 2023
Vicarius Cartoons Presents: IT Passover
By David Parkinson Frost
Mar 27, 2023
Acropalypse wreaking havoc, zero-days in Samsung Exynos, Emotet returns (again)
By Vicarius Cartoons
Feb 14, 2023
Vicarius Cartoons Presents: Cupid's Exploit
By Paul Lighter
Jan 11, 2023
When the Target is Also the Threat
A software failure grounded thousands of flights today, raising a complicated question - how do you secure an unstable system? The answer has never been more urgent.
By Paul Lighter
Jan 06, 2023
The Uncomfortable Implications of the LastPass Attack
The recent attack on LastPass has people questioning if they can trust password managers. But there's a bigger issue lurking underneath - can you trust ANY security vendor?