Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-50313

Опубликовано: 12 нояб. 2024
Источник: nvd
CVSS3: 5.3
CVSS3: 4.8
EPSS Низкий

Описание

A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.16.0 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.12 (All versions < V10.12.7 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.6 (All versions < V10.6.15 only if the basic authentication mechanism is used by the application), Mendix Runtime V8 (All versions only if the basic authentication mechanism is used by the application), Mendix Runtime V9 (All versions < V9.24.29 only if the basic authentication mechanism is used by the application). The basic authentication implementation of affected applications contains a race condition vulnerability which could allow unauthenticated remote attackers to circumvent default account lockout measures.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*
Версия от 8.0.0 (включая) до 9.24.29 (исключая)
cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*
Версия от 10.0.0 (включая) до 10.6.15 (исключая)
cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*
Версия от 10.7.0 (включая) до 10.12.7 (исключая)
cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*
Версия от 10.13.0 (включая) до 10.16.0 (исключая)

EPSS

Процентиль: 68%
0.00561
Низкий

5.3 Medium

CVSS3

4.8 Medium

CVSS3

Дефекты

CWE-362

Связанные уязвимости

CVSS3: 5.3
github
около 1 года назад

A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.16.0 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.12 (All versions < V10.12.7 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.6 (All versions < V10.6.15 only if the basic authentication mechanism is used by the application), Mendix Runtime V8 (All versions), Mendix Runtime V9 (All versions < V9.24.29 only if the basic authentication mechanism is used by the application). The basic authentication implementation of affected applications contains a race condition vulnerability which could allow unauthenticated remote attackers to circumvent default account lockout measures.

CVSS3: 5.3
fstec
около 13 лет назад

Уязвимость базового механизма аутентификации (Basic Authentication Mechanism) среды выполнения Mendix Runtime, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 68%
0.00561
Низкий

5.3 Medium

CVSS3

4.8 Medium

CVSS3

Дефекты

CWE-362