U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-15039

Change History

New CVE Received by NIST 7/10/2024 11:15:02 PM

Action Type Old Value New Value
Added CVSS V2

								
							
							
						
VulDB (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Added CVSS V3.1

								
							
							
						
VulDB AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Added CVSS V4.0

								
							
							
						
VulDB CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Added CWE

								
							
							
						
VulDB CWE-444
Added Description

								
							
							
						
A vulnerability classified as critical was found in mhuertos phpLDAPadmin up to 665dbc2690ebeb5392d38f1fece0a654225a0b38. Affected by this vulnerability is the function makeHttpRequest of the file htdocs/js/ajax_functions.js. The manipulation leads to http request smuggling. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named dd6e9583a2eb2ca085583765e8a63df5904cb036. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-270523.
Added Reference

								
							
							
						
VulDB https://github.com/mhuertos/phpLDAPadmin/commit/dd6e9583a2eb2ca085583765e8a63df5904cb036 [No types assigned]
Added Reference

								
							
							
						
VulDB https://vuldb.com/?ctiid.270523 [No types assigned]
Added Reference

								
							
							
						
VulDB https://vuldb.com/?id.270523 [No types assigned]