logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2022-3741

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2022-3741

Description:
Impact varies for each individual vulnerability in the application. For generation of accounts, it may be possible, depending on the amount of system resources available, to create a DoS event in the server. These accounts still need to be activated; however, it is possible to identify the output Status Code to separate accounts that are generated and waiting for email verification. \n\nFor the sign in directories, it is possible to brute force login attempts to either login portal, which could lead to account compromise.
Last updated date:
11/01/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
11/01/2022
Reference url to background

https://huntr.dev/bounties/46f6e07e-f438-4540-938a-510047f987d0

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy