Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 08 Aug 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Journyx
Journyx journyx |
|
Weaknesses | CWE-798 | |
CPEs | cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:* | |
Vendors & Products |
Journyx
Journyx journyx |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 08 Aug 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 08 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 07 Aug 2024 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-321 CWE-334 CWE-799 |
Wed, 07 Aug 2024 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password. | |
Title | Journyx Unauthenticated Password Reset Bruteforce | |
References |
|

Status: PUBLISHED
Assigner: KoreLogic
Published:
Updated: 2024-08-08T13:28:52.446Z
Reserved: 2024-07-18T19:25:47.090Z
Link: CVE-2024-6890

Updated: 2024-08-08T01:29:14.179Z

Status : Modified
Published: 2024-08-07T23:15:41.543
Modified: 2024-11-21T09:50:28.447
Link: CVE-2024-6890

No data.

No data.