Dradis Professional Edition before 4.3.0 allows attackers to change an account password via reusing a password reset token.
                
            References
                    | Link | Resource | 
|---|---|
| https://dradisframework.com/ce/security_reports.html | Vendor Advisory | 
| https://dradisframework.com/ce/security_reports.html | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:02
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://dradisframework.com/ce/security_reports.html - Vendor Advisory | 
Information
                Published : 2022-06-24 17:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-30028
Mitre link : CVE-2022-30028
CVE.ORG link : CVE-2022-30028
JSON object : View
Products Affected
                dradisframework
- dradis
CWE
                
                    
                        
                        CWE-362
                        
            Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
