Total
185 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-1000554 | 1 Trovebox | 1 Trovebox | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
Trovebox version <= 4.0.0-rc6 contains a Unsafe password reset token generation vulnerability in user component that can result in Password reset. This attack appear to be exploitable via HTTP request. This vulnerability appears to have been fixed in after commit 742b8ed. | |||||
CVE-2018-1000501 | 1 Instant-update | 1 Instant Update Cms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Instant Update CMS contains a Password Reset Vulnerability vulnerability in /iu-application/controllers/administration/auth.php that can result in Account Tackover. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in v0.3.3. | |||||
CVE-2018-0787 | 1 Microsoft | 1 Asp.net Core | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to how web applications that are created from templates validate web requests, aka "ASP.NET Core Elevation Of Privilege Vulnerability". | |||||
CVE-2018-0696 | 1 Osstech | 1 Openam | 2024-11-21 | 3.5 LOW | 7.5 HIGH |
OpenAM (Open Source Edition) 13.0 and later does not properly manage sessions, which allows remote authenticated attackers to change the security questions and reset the login password via unspecified vectors. | |||||
CVE-2017-8916 | 1 Cisecurity | 1 Cis-cat Pro Dashboard | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
In Center for Internet Security CIS-CAT Pro Dashboard before 1.0.4, an authenticated user is able to change an administrative user's e-mail address and send a forgot password email to themselves, thereby gaining administrative access. | |||||
CVE-2017-2614 | 1 Redhat | 1 Enterprise Virtualization | 2024-11-21 | 2.1 LOW | 6.8 MEDIUM |
When updating a password in the rhvm database the ovirt-aaa-jdbc-tool tools before 1.1.3 fail to correctly check for the current password if it is expired. This would allow access to an attacker with access to change the password on accounts with expired passwords, gaining access to those accounts. | |||||
CVE-2017-17097 | 1 Gps-server | 1 Gps Tracking Software | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
gps-server.net GPS Tracking Software (self hosted) 2.x has a password reset procedure that immediately resets passwords upon an unauthenticated request, and then sends e-mail with a predictable (date-based) password to the admin, which makes it easier for remote attackers to obtain access by predicting this new password. This is related to the use of gmdate for password creation in fn_connect.php. | |||||
CVE-2017-12161 | 1 Keycloak | 1 Keycloak | 2024-11-21 | 4.3 MEDIUM | 8.8 HIGH |
It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks. | |||||
CVE-2017-1000141 | 1 Mahara | 1 Mahara | 2024-11-21 | 6.4 MEDIUM | 6.5 MEDIUM |
An issue was discovered in Mahara before 18.10.0. It mishandled user requests that could discontinue a user's ability to maintain their own account (changing username, changing primary email address, deleting account). The correct behavior was to either prompt them for their password and/or send a warning to their primary email address. | |||||
CVE-2017-0921 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 6.8 MEDIUM | 8.1 HIGH |
GitLab Community and Enterprise Editions before 10.1.6, 10.2.6, and 10.3.4 are vulnerable to an unverified password change issue in the PasswordsController component resulting in potential account takeover if a victim's session is compromised. | |||||
CVE-2015-10071 | 1 Gitter | 1 Ez Publish Modern Legacy | 2024-11-21 | 1.4 LOW | 2.6 LOW |
A vulnerability was found in gitter-badger ezpublish-modern-legacy. It has been rated as problematic. This issue affects some unknown processing of the file kernel/user/forgotpassword.php. The manipulation leads to weak password recovery. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 1.0 is able to address this issue. The patch is named 5908d5ee65fec61ce0e321d586530461a210bf2a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218951. | |||||
CVE-2014-6412 | 1 Wordpress | 1 Wordpress | 2024-11-21 | 5.0 MEDIUM | 8.1 HIGH |
WordPress before 4.4 makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach. | |||||
CVE-2012-5686 | 1 Zpanelcp | 1 Zpanel | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
ZPanel 10.0.1 has insufficient entropy for its password reset process. | |||||
CVE-2012-5618 | 1 Ushahidi | 1 Ushahidi | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
Ushahidi before 2.6.1 has insufficient entropy for forgot-password tokens. | |||||
CVE-2009-5025 | 1 Pyforum Project | 1 Pyforum | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
A backdoor (aka BMSA-2009-07) was found in PyForum v1.0.3 where an attacker who knows a valid user email could force a password reset on behalf of that user. | |||||
CVE-2024-45670 | 1 Ibm | 1 Soar | 2024-11-16 | N/A | 8.1 HIGH |
IBM Security SOAR 51.0.1.0 and earlier contains a mechanism for users to recover or change their passwords without knowing the original password, but the user account must be compromised prior to the weak recovery mechanism. | |||||
CVE-2024-9302 | 1 Appcheap | 1 App Builder | 2024-11-05 | N/A | 9.8 CRITICAL |
The App Builder – Create Native Android & iOS Apps On The Flight plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.3.7. This is due to the verify_otp_forgot_password() and update_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator. | |||||
CVE-2024-50356 | 2024-11-01 | N/A | N/A | ||
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug. | |||||
CVE-2024-9305 | 2024-10-16 | N/A | 8.1 HIGH | ||
The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.4. This is due to the appp_reset_password() and validate_reset_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator. | |||||
CVE-2024-9907 | 2024-10-15 | 2.6 LOW | 3.7 LOW | ||
A vulnerability classified as problematic was found in QileCMS up to 1.1.3. This vulnerability affects the function sendEmail of the file /qilecms/user/controller/Forget.php of the component Verification Code Handler. The manipulation leads to weak password recovery. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |