
We found results for “”
CVE-2023-49810
Good to know:

Date: January 10, 2024
A login attempt restriction bypass vulnerability exists in the checkLoginAttempts functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to captcha bypass, which can be abused by an attacker to brute force user credentials. An attacker can send a series of HTTP requests to trigger this vulnerability.
Language: PHP
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Improper Restriction of Excessive Authentication Attempts
CWE-307Top Fix

Upgrade Version
Upgrade to version wwbn/avideo - dev-julzxcapz-yp2;wwbn/avideo - dev-dependabot/composer/aws/aws-sdk-php-3.261.4;wwbn/avideo - dev-dependabot/composer/stripe/stripe-php-10.12.1;wwbn/avideo - 14.3;wwbn/avideo - dev-akhilleusuggo-patch-12;wwbn/avideo - dev-akhilleusuggo-patch-11
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | LOW |