9.8
CVE-2017-7673
- EPSS 0.41%
- Published 17.07.2017 13:18:29
- Last modified 20.04.2025 01:37:25
- Source security@apache.org
- Teams watchlist Login
- Open Login
Apache OpenMeetings 1.0.0 uses not very strong cryptographic storage, captcha is not used in registration and forget password dialogs and auth forms missing brute force protection.
Data is provided by the National Vulnerability Database (NVD)
Apache ≫ Openmeetings Version1.0.0
Apache ≫ Openmeetings Version2.0
Apache ≫ Openmeetings Version2.1
Apache ≫ Openmeetings Version2.1.1
Apache ≫ Openmeetings Version2.2.0
Apache ≫ Openmeetings Version3.0.0
Apache ≫ Openmeetings Version3.0.1
Apache ≫ Openmeetings Version3.0.2
Apache ≫ Openmeetings Version3.0.3
Apache ≫ Openmeetings Version3.0.4
Apache ≫ Openmeetings Version3.0.5
Apache ≫ Openmeetings Version3.0.6
Apache ≫ Openmeetings Version3.0.7
Apache ≫ Openmeetings Version3.1.0
Apache ≫ Openmeetings Version3.1.1
Apache ≫ Openmeetings Version3.1.2
Apache ≫ Openmeetings Version3.1.3
Apache ≫ Openmeetings Version3.1.4
Apache ≫ Openmeetings Version3.1.5
Apache ≫ Openmeetings Version3.2.0
Apache ≫ Openmeetings Version3.2.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.41% | 0.58 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-307 Improper Restriction of Excessive Authentication Attempts
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
CWE-326 Inadequate Encryption Strength
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.