Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46907 | In lunary-ai/lunary versions <=v1.2.11, an attacker can bypass email validation by using a dot character ('.') in the email address. This allows the creation of multiple accounts with essentially the same email address (e.g., 'attacker123@gmail.com' and 'attacker.123@gmail.com'), leading to incorrect synchronization and potential security issues. |
Thu, 19 Sep 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lunary
Lunary lunary |
|
| Weaknesses | NVD-CWE-Other | |
| CPEs | cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lunary
Lunary lunary |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T21:18:07.033Z
Reserved: 2024-06-07T17:02:33.877Z
Link: CVE-2024-5755
Updated: 2024-08-01T21:18:07.033Z
Status : Modified
Published: 2024-06-27T19:15:16.400
Modified: 2024-11-21T09:48:17.093
Link: CVE-2024-5755
No data.
OpenCVE Enrichment
No data.
EUVD