Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 21 Apr 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arrowjs
Arrowjs arrowcms |
|
| CPEs | cpe:2.3:a:arrowjs:arrowcms:1.0.0:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Arrowjs
Arrowjs arrowcms |
Mon, 26 Aug 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trquoccuong
Trquoccuong arrow Cms |
|
| Weaknesses | CWE-74 | |
| CPEs | cpe:2.3:a:trquoccuong:arrow_cms:1.0.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Trquoccuong
Trquoccuong arrow Cms |
|
| Metrics |
cvssV3_1
|
Fri, 23 Aug 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A host header injection vulnerability exists in the forgot password functionality of ArrowCMS version 1.0.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-26T16:22:58.840Z
Reserved: 2024-08-05T00:00:00.000Z
Link: CVE-2024-42914
Updated: 2024-08-26T16:22:52.462Z
Status : Analyzed
Published: 2024-08-23T19:15:07.010
Modified: 2025-04-21T14:40:46.860
Link: CVE-2024-42914
No data.
OpenCVE Enrichment
No data.