Jorani Leave Management System 1.0.2 allows a remote attacker to spoof a Host header associated with password reset emails.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/175802 | Exploit Third Party Advisory VDB Entry |
| http://packetstormsecurity.com/files/175802 | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 08:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/175802 - Exploit, Third Party Advisory, VDB Entry |
11 Dec 2023, 15:26
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:jorani:leave_management_system:1.0.2:*:*:*:*:*:*:* | |
| References | () http://packetstormsecurity.com/files/175802 - Exploit, Third Party Advisory, VDB Entry | |
| First Time |
Jorani leave Management System
Jorani |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| CWE | CWE-74 |
07 Dec 2023, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-12-07 07:15
Updated : 2024-11-21 08:31
NVD link : CVE-2023-48205
Mitre link : CVE-2023-48205
CVE.ORG link : CVE-2023-48205
JSON object : View
Products Affected
jorani
- leave_management_system
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
