Metrics
Affected Vendors & Products
Thu, 15 Aug 2024 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Projectsend Projectsend projectsend | |
| CPEs | cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:* | |
| Vendors & Products | Projectsend Projectsend projectsend | 
Tue, 13 Aug 2024 18:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Sun, 11 Aug 2024 03:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component. | |
| Title | projectsend Password Reset Token functions.php generate_random_string random values | |
| Weaknesses | CWE-330 | |
| References |  | |
| Metrics | cvssV2_0 
 
 
 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-13T17:15:00.214Z
Reserved: 2024-08-10T08:00:04.212Z
Link: CVE-2024-7659
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-13T17:14:53.285Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-08-12T13:38:49.920
Modified: 2024-08-15T17:49:42.667
Link: CVE-2024-7659
 Redhat
                        Redhat
                    No data.