Vulnerability in zenml-io/zenml 0.56.3 allows session reuse after password chang
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | CVE-2024-4680 Insufficient Session Expiration in zenml-io/zenml | 8 Jun 202419:38 | – | cvelist |
![]() | CVE-2024-4680 | 8 Jun 202420:15 | – | osv |
![]() | GHSA-99HM-86H7-GR3G zenml-io/zenml does not expire the session after password reset | 8 Jun 202421:30 | – | osv |
![]() | CVE-2024-4680 Insufficient Session Expiration in zenml-io/zenml | 8 Jun 202419:38 | – | vulnrichment |
![]() | ZenML < 0.56.3 Unpatched Session Expiration Exposure (CVE-2024-4680) | 3 Jan 202500:00 | – | nessus |
![]() | CVE-2024-4680 | 8 Jun 202420:15 | – | cve |
![]() | Insufficient Session Expiration | 12 Jun 202406:34 | – | veracode |
![]() | zenml-io/zenml does not expire the session after password reset | 8 Jun 202421:30 | – | github |
Source | Link |
---|---|
huntr | www.huntr.com/bounties/c88f6bd2-490d-4930-98dd-03651b20230a |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo