Логотип exploitDog
bind:CVE-2024-6890
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-6890

Количество 2

Количество 2

nvd логотип

CVE-2024-6890

больше 1 года назад

Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-4rc5-7v2h-gq36

больше 1 года назад

Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-6890

Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.

CVSS3: 8.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-4rc5-7v2h-gq36

Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.

CVSS3: 9.8
0%
Низкий
больше 1 года назад

Уязвимостей на страницу