Metrics
Affected Vendors & Products
Thu, 13 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
ssvc
|
Thu, 29 Aug 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache answer |
|
CPEs | cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache answer |
|
Metrics |
cvssV3_1
|
Fri, 09 Aug 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 09 Aug 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked. Users are recommended to upgrade to version 1.3.6, which fixes the issue. | |
Title | Apache Answer: The link to reset the user's password will remain valid after sending a new link | |
Weaknesses | CWE-772 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-03-13T18:27:24.551Z
Reserved: 2024-07-23T02:41:50.995Z
Link: CVE-2024-41890

Updated: 2024-08-09T15:02:54.353Z

Status : Modified
Published: 2024-08-12T13:38:31.733
Modified: 2025-03-13T19:15:47.500
Link: CVE-2024-41890

No data.