Impact varies for each individual vulnerability in the application. For generation of accounts, it may be possible, depending on the amount of system resources available, to create a DoS event in the server. These accounts still need to be activated; however, it is possible to identify the output Status Code to separate accounts that are generated and waiting for email verification. \n\nFor the sign in directories, it is possible to brute force login attempts to either login portal, which could lead to account compromise.
History

Fri, 09 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntrdev

Published: 2022-10-28T00:00:00.000Z

Updated: 2025-05-09T19:19:52.573Z

Reserved: 2022-10-28T00:00:00.000Z

Link: CVE-2022-3741

cve-icon Vulnrichment

Updated: 2024-08-03T01:20:57.602Z

cve-icon NVD

Status : Modified

Published: 2022-10-28T13:15:16.870

Modified: 2024-11-21T07:20:08.907

Link: CVE-2022-3741

cve-icon Redhat

No data.