Automatic Question Paper Generator 1.0 password recovery

A vulnerability was found in Automatic Question Paper Generator 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to weak password recovery. The CWE definition for the vulnerability is CWE-640. The weakness was shared 03/13/2022. This vulnerability is known as CVE-2022-1073. The attack can be launched remotely. There are no technical details available. Furthermore, there is an exploit available. The pricing for an exploit might be around USD $0-$5k at the moment. The attack technique deployed by this issue is T1552 according to MITRE ATT&CK. It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $0-$5k. A possible mitigation has been published even before and not after the disclosure of the vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

116
243791

Field

exploit_price_0day2
vulnerability_cvss3_vuldb_tempscore2
vulnerability_cvss3_vuldb_basescore2
vulnerability_cvss3_meta_tempscore2
vulnerability_cvss3_meta_basescore2

Commit Conf

90%26
50%12
100%4

Approve Conf

90%27
80%12
100%3
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1231080803/25/2022VulD...responsibleVulDB03/25/2022accepted
100
1231080703/25/2022VulD...cve_cnaVulDBcve.org03/25/2022accepted
100
1231080603/25/2022VulD...cveCVE-2022-1073cve.org03/25/2022accepted
100
1226772103/14/2022VulD...price_0day$0-$5ksee exploit price documentation03/14/2022accepted
90
1226772003/14/2022VulD...cvss3_vuldb_tempscore6.9see CVSS documentation03/14/2022accepted
90
1226771903/14/2022VulD...cvss3_vuldb_basescore7.3see CVSS documentation03/14/2022accepted
90
1226771803/14/2022VulD...cvss3_meta_tempscore6.9see CVSS documentation03/14/2022accepted
90
1226771703/14/2022VulD...cvss3_meta_basescore7.3see CVSS documentation03/14/2022accepted
90
1226771603/14/2022mrempycvss3_vuldb_avNsee CVSS documentation03/14/2022accepted
90
1226722603/13/2022VulD...price_0day$0-$5ksee exploit price documentation03/13/2022accepted
90
1226722503/13/2022VulD...cvss3_meta_tempscore6.0see CVSS documentation03/13/2022accepted
90
1226722403/13/2022VulD...cvss3_meta_basescore6.3see CVSS documentation03/13/2022accepted
90
1226722303/13/2022VulD...cvss3_vuldb_tempscore6.0see CVSS documentation03/13/2022accepted
90
1226722203/13/2022VulD...cvss3_vuldb_basescore6.3see CVSS documentation03/13/2022accepted
90
1226722103/13/2022VulD...cvss2_vuldb_tempscore5.2see CVSS documentation03/13/2022accepted
90
1226722003/13/2022VulD...cvss2_vuldb_basescore5.8see CVSS documentation03/13/2022accepted
90
1226721903/13/2022VulD...cvss3_vuldb_rcXderived from historical data03/13/2022accepted
80
1226721803/13/2022VulD...cvss3_vuldb_rlXderived from historical data03/13/2022accepted
80
1226721703/13/2022VulD...cvss3_vuldb_avAderived from historical data03/13/2022accepted
80
1226721603/13/2022VulD...cvss2_vuldb_rcNDderived from historical data03/13/2022accepted
80

22 more entries are not shown

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!