CVE-2024-6890

8.8HIGH

Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administra

Veröffentlicht: 8/7/2024Aktualisiert: 11/21/2024

Beschreibung

Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.

KI-AnalyseKI-gestützt

Betroffene Produkte

journyxjournyx
11.5.4

Referenzen