Vulnerability Details CVE-2016-0783
The sendHashByUser function in Apache OpenMeetings before 3.1.1 generates predictable password reset tokens, which makes it easier for remote attackers to reset arbitrary user passwords by leveraging knowledge of a user name and the current system time.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.015
EPSS Ranking 80.0%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2016-0783
-
cpe:2.3:a:apache:openmeetings:1.0.0
-
cpe:2.3:a:apache:openmeetings:2.0
-
cpe:2.3:a:apache:openmeetings:2.1
-
cpe:2.3:a:apache:openmeetings:2.1.1
-
cpe:2.3:a:apache:openmeetings:2.2.0
-
cpe:2.3:a:apache:openmeetings:3.0.0
-
cpe:2.3:a:apache:openmeetings:3.0.1
-
cpe:2.3:a:apache:openmeetings:3.0.2
-
cpe:2.3:a:apache:openmeetings:3.0.3
-
cpe:2.3:a:apache:openmeetings:3.0.4
-
cpe:2.3:a:apache:openmeetings:3.0.5
-
cpe:2.3:a:apache:openmeetings:3.0.6
-
cpe:2.3:a:apache:openmeetings:3.0.7
-
cpe:2.3:a:apache:openmeetings:3.1.0