Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-48023 | A vulnerability has been identified in Mendix Forgot Password (Mendix 10 compatible) (All versions < V5.4.0), Mendix Forgot Password (Mendix 7 compatible) (All versions < V3.7.3), Mendix Forgot Password (Mendix 8 compatible) (All versions < V4.1.3), Mendix Forgot Password (Mendix 9 compatible) (All versions < V5.4.0). Applications using the affected module are vulnerable to user enumeration due to distinguishable responses. This could allow an unauthenticated remote attacker to determine if a user is valid or not, enabling a brute force attack with valid users. |
Wed, 18 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-09-18T18:50:02.157Z
Reserved: 2023-09-20T10:25:52.304Z
Link: CVE-2023-43623
Updated: 2024-08-02T19:44:43.813Z
Status : Modified
Published: 2023-10-10T11:15:12.240
Modified: 2024-11-21T08:24:29.350
Link: CVE-2023-43623
No data.
OpenCVE Enrichment
No data.
EUVD