Description
U&M Software Signup 1.0 and 1.1 does not require administrative authentication for all scripts in the admin/ directory, which allows remote attackers to have an unspecified impact via a direct request to (1) adminstart.php, (2) admineventtype.php, (3) admineventdetails.php, (4) admineventlist.php, (5) adminuserslist.php, (6) adminleaderslist.php, (7) admindatabase.php, and possibly (8) index.php.
Exploits (1)
References (3)
Core 3
Core References
Various Sources x_refsource_misc
http://signup.uochm.com/features.php
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7032
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/32166
Scores
EPSS
0.0367
EPSS Percentile
88.0%
Details
CWE
CWE-287
Status
published
Products (2)
uochm/signup
1.0
uochm/signup
1.1
Published
Apr 13, 2009
Tracked Since
Feb 18, 2026