Lucene search

K

Journyx Security Vulnerabilities

cve
cve

CVE-2024-6890

Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.

8.8CVSS

6.8AI Score

0.001EPSS

2024-08-07 11:15 PM
27
cve
cve

CVE-2024-6891

Attackers with a valid username and password can exploit a python code injection vulnerability during the natural login flow.

8.8CVSS

7.2AI Score

0.0005EPSS

2024-08-08 12:15 AM
24
cve
cve

CVE-2024-6892

Attackers can craft a malicious link that once clicked will execute arbitrary JavaScript in the context of the Journyx web application.

6.1CVSS

7AI Score

0.0005EPSS

2024-08-08 12:15 AM
22
cve
cve

CVE-2024-6893

The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.

7.5CVSS

6.6AI Score

0.941EPSS

2024-08-08 12:15 AM
40