Total
195 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-17881 | 2 D-link, Dlink | 2 Dir-823g Firmware, Dir-823g | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
On D-Link DIR-823G 2018-09-19 devices, the GoAhead configuration allows /HNAP1 SetPasswdSettings commands without authentication to trigger an admin password change. | |||||
CVE-2018-17401 | 1 Phonepe | 1 Phonepe | 2024-11-21 | 4.3 MEDIUM | 8.8 HIGH |
The PhonePe wallet (aka com.PhonePe.app) application 3.0.6 through 3.3.26 for Android might allow attackers to perform Account Takeover attacks by exploiting its Forgot Password feature. NOTE: the vendor says that, to exploit this, the user has to explicitly install a malicious app and provide accessibility permission to the malicious app, that the Android platform provides fair warnings to the users before turning on accessibility for any application, and that it believes it is similar to installing malicious keyboards, or malicious apps taking screenshots | |||||
CVE-2018-17298 | 1 Enalean | 1 Tuleap | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
An issue was discovered in Enalean Tuleap before 10.5. Reset password links are not invalidated after a user changes its password. | |||||
CVE-2018-16988 | 1 Xdmod | 1 Open Xdmod | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
An issue was discovered in Open XDMoD through 7.5.0. An authentication bypass (account takeover) exists due to a weak password reset mechanism. A brute-force attack against an MD5 rid value requires only 600 guesses in the plausible situation where the attacker knows that the victim has started a password-reset process (pass_reset.php, password_reset.php, XDUser.php) in the past few minutes. | |||||
CVE-2018-16529 | 1 Forcepoint | 1 Email Security | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
A password reset vulnerability has been discovered in Forcepoint Email Security 8.5.x. The password reset URL can be used after the intended expiration period or after the URL has already been used to reset a password. | |||||
CVE-2018-12579 | 1 Oxid-esales | 1 Eshop | 2024-11-21 | 6.8 MEDIUM | 8.1 HIGH |
An issue was discovered in OXID eShop Enterprise Edition before 5.3.8, 6.0.x before 6.0.3, and 6.1.x before 6.1.0; Professional Edition before 4.10.8, 5.x and 6.0.x before 6.0.3, and 6.1.x before 6.1.0; and Community Edition before 4.10.8, 5.x and 6.0.x before 6.0.3, and 6.1.x before 6.1.0. An attacker could gain access to the admin panel or a customer account when using the password reset function. To do so, it is required to own a domain name similar to the one the victim uses for their e-mail accounts. | |||||
CVE-2018-12421 | 1 Ltb-project | 1 Ldap Tool Box Self Service Password | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
LTB (aka LDAP Tool Box) Self Service Password before 1.3 allows a change to a user password (without knowing the old password) via a crafted POST request, because the ldap_bind return value is mishandled and the PHP data type is not constrained to be a string. | |||||
CVE-2018-12315 | 1 Asustor | 2 As602t, Data Master | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Missing verification of a password in ASUSTOR ADM version 3.1.1 allows attackers to change account passwords without entering the current password. | |||||
CVE-2018-11134 | 1 Quest | 1 Kace System Management Appliance | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges. | |||||
CVE-2018-10081 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
CMS Made Simple (CMSMS) through 2.2.6 contains an admin password reset vulnerability because data values are improperly compared, as demonstrated by a hash beginning with the "0e" substring. | |||||
CVE-2018-1000812 | 1 Artica | 1 Integria Ims | 2024-11-21 | 4.3 MEDIUM | 8.1 HIGH |
Artica Integria IMS version 5.0 MR56 Package 58, likely earlier versions contains a CWE-640: Weak Password Recovery Mechanism for Forgotten Password vulnerability in Password recovery process, line 45 of general/password_recovery.php that can result in IntegriaIMS web app user accounts can be taken over. This attack appear to be exploitable via Network access to IntegriaIMS web interface . This vulnerability appears to have been fixed in fixed in versions released after commit f2ff0ba821644acecb893483c86a9c4d3bb75047. | |||||
CVE-2018-1000554 | 1 Trovebox | 1 Trovebox | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
Trovebox version <= 4.0.0-rc6 contains a Unsafe password reset token generation vulnerability in user component that can result in Password reset. This attack appear to be exploitable via HTTP request. This vulnerability appears to have been fixed in after commit 742b8ed. | |||||
CVE-2018-1000501 | 1 Instant-update | 1 Instant Update Cms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Instant Update CMS contains a Password Reset Vulnerability vulnerability in /iu-application/controllers/administration/auth.php that can result in Account Tackover. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in v0.3.3. | |||||
CVE-2018-0787 | 1 Microsoft | 1 Asp.net Core | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to how web applications that are created from templates validate web requests, aka "ASP.NET Core Elevation Of Privilege Vulnerability". | |||||
CVE-2018-0696 | 1 Osstech | 1 Openam | 2024-11-21 | 3.5 LOW | 7.5 HIGH |
OpenAM (Open Source Edition) 13.0 and later does not properly manage sessions, which allows remote authenticated attackers to change the security questions and reset the login password via unspecified vectors. | |||||
CVE-2017-8916 | 1 Cisecurity | 1 Cis-cat Pro Dashboard | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
In Center for Internet Security CIS-CAT Pro Dashboard before 1.0.4, an authenticated user is able to change an administrative user's e-mail address and send a forgot password email to themselves, thereby gaining administrative access. | |||||
CVE-2017-2614 | 1 Redhat | 1 Enterprise Virtualization | 2024-11-21 | 2.1 LOW | 6.8 MEDIUM |
When updating a password in the rhvm database the ovirt-aaa-jdbc-tool tools before 1.1.3 fail to correctly check for the current password if it is expired. This would allow access to an attacker with access to change the password on accounts with expired passwords, gaining access to those accounts. | |||||
CVE-2017-17097 | 1 Gps-server | 1 Gps Tracking Software | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
gps-server.net GPS Tracking Software (self hosted) 2.x has a password reset procedure that immediately resets passwords upon an unauthenticated request, and then sends e-mail with a predictable (date-based) password to the admin, which makes it easier for remote attackers to obtain access by predicting this new password. This is related to the use of gmdate for password creation in fn_connect.php. | |||||
CVE-2017-12161 | 1 Keycloak | 1 Keycloak | 2024-11-21 | 4.3 MEDIUM | 8.8 HIGH |
It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks. | |||||
CVE-2017-1000141 | 1 Mahara | 1 Mahara | 2024-11-21 | 6.4 MEDIUM | 6.5 MEDIUM |
An issue was discovered in Mahara before 18.10.0. It mishandled user requests that could discontinue a user's ability to maintain their own account (changing username, changing primary email address, deleting account). The correct behavior was to either prompt them for their password and/or send a warning to their primary email address. |