Vulnerability Details CVE-2024-2213
An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to improper authentication mechanisms, an attacker with access to an active user session can change the account password without needing to know the current password. This vulnerability allows for unauthorized account takeover by bypassing the standard password change verification process. The issue was fixed in version 0.56.3.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 10.7%
CVSS Severity
CVSS v3 Score 3.3
Products affected by CVE-2024-2213
-
-
cpe:2.3:a:zenml:zenml:0.1.0
-
cpe:2.3:a:zenml:zenml:0.1.1
-
cpe:2.3:a:zenml:zenml:0.1.2
-
cpe:2.3:a:zenml:zenml:0.1.3
-
cpe:2.3:a:zenml:zenml:0.1.4
-
cpe:2.3:a:zenml:zenml:0.1.5
-
cpe:2.3:a:zenml:zenml:0.10.0
-
cpe:2.3:a:zenml:zenml:0.11.0
-
cpe:2.3:a:zenml:zenml:0.12.0
-
cpe:2.3:a:zenml:zenml:0.13.0
-
cpe:2.3:a:zenml:zenml:0.13.1
-
cpe:2.3:a:zenml:zenml:0.13.2
-
cpe:2.3:a:zenml:zenml:0.2.0
-
cpe:2.3:a:zenml:zenml:0.20.0
-
cpe:2.3:a:zenml:zenml:0.20.1
-
cpe:2.3:a:zenml:zenml:0.20.2
-
cpe:2.3:a:zenml:zenml:0.20.3
-
cpe:2.3:a:zenml:zenml:0.20.4
-
cpe:2.3:a:zenml:zenml:0.20.5
-
cpe:2.3:a:zenml:zenml:0.21.0
-
cpe:2.3:a:zenml:zenml:0.21.1
-
cpe:2.3:a:zenml:zenml:0.22.0
-
cpe:2.3:a:zenml:zenml:0.23.0
-
cpe:2.3:a:zenml:zenml:0.3.0
-
cpe:2.3:a:zenml:zenml:0.3.1
-
cpe:2.3:a:zenml:zenml:0.3.2
-
cpe:2.3:a:zenml:zenml:0.3.3
-
cpe:2.3:a:zenml:zenml:0.3.4
-
cpe:2.3:a:zenml:zenml:0.3.5
-
cpe:2.3:a:zenml:zenml:0.3.6
-
cpe:2.3:a:zenml:zenml:0.3.6.1
-
cpe:2.3:a:zenml:zenml:0.3.7
-
cpe:2.3:a:zenml:zenml:0.3.7.1
-
cpe:2.3:a:zenml:zenml:0.3.8
-
cpe:2.3:a:zenml:zenml:0.3.9
-
cpe:2.3:a:zenml:zenml:0.30.0
-
cpe:2.3:a:zenml:zenml:0.31.0
-
cpe:2.3:a:zenml:zenml:0.31.1
-
cpe:2.3:a:zenml:zenml:0.32.0
-
cpe:2.3:a:zenml:zenml:0.32.1
-
cpe:2.3:a:zenml:zenml:0.33.0
-
cpe:2.3:a:zenml:zenml:0.34.0
-
cpe:2.3:a:zenml:zenml:0.35.0
-
cpe:2.3:a:zenml:zenml:0.35.1
-
cpe:2.3:a:zenml:zenml:0.36.0
-
cpe:2.3:a:zenml:zenml:0.36.1
-
cpe:2.3:a:zenml:zenml:0.37.0
-
cpe:2.3:a:zenml:zenml:0.38.0
-
cpe:2.3:a:zenml:zenml:0.39.0
-
cpe:2.3:a:zenml:zenml:0.39.1
-
cpe:2.3:a:zenml:zenml:0.40.0
-
cpe:2.3:a:zenml:zenml:0.40.1
-
cpe:2.3:a:zenml:zenml:0.40.2
-
cpe:2.3:a:zenml:zenml:0.40.3
-
cpe:2.3:a:zenml:zenml:0.41.0
-
cpe:2.3:a:zenml:zenml:0.42.0
-
cpe:2.3:a:zenml:zenml:0.42.1
-
cpe:2.3:a:zenml:zenml:0.42.2
-
cpe:2.3:a:zenml:zenml:0.43.0
-
cpe:2.3:a:zenml:zenml:0.43.1
-
cpe:2.3:a:zenml:zenml:0.44.0
-
cpe:2.3:a:zenml:zenml:0.44.1
-
cpe:2.3:a:zenml:zenml:0.44.2
-
cpe:2.3:a:zenml:zenml:0.44.3
-
cpe:2.3:a:zenml:zenml:0.44.4
-
cpe:2.3:a:zenml:zenml:0.45.0
-
cpe:2.3:a:zenml:zenml:0.45.1
-
cpe:2.3:a:zenml:zenml:0.45.2
-
cpe:2.3:a:zenml:zenml:0.45.3
-
cpe:2.3:a:zenml:zenml:0.45.4
-
cpe:2.3:a:zenml:zenml:0.45.5
-
cpe:2.3:a:zenml:zenml:0.45.6
-
cpe:2.3:a:zenml:zenml:0.46.0
-
cpe:2.3:a:zenml:zenml:0.46.1
-
cpe:2.3:a:zenml:zenml:0.47.0
-
cpe:2.3:a:zenml:zenml:0.5.0
-
cpe:2.3:a:zenml:zenml:0.5.1
-
cpe:2.3:a:zenml:zenml:0.5.2
-
cpe:2.3:a:zenml:zenml:0.5.3
-
cpe:2.3:a:zenml:zenml:0.5.4
-
cpe:2.3:a:zenml:zenml:0.5.5
-
cpe:2.3:a:zenml:zenml:0.5.6
-
cpe:2.3:a:zenml:zenml:0.5.7
-
cpe:2.3:a:zenml:zenml:0.50.0
-
cpe:2.3:a:zenml:zenml:0.51.0
-
cpe:2.3:a:zenml:zenml:0.52.0
-
cpe:2.3:a:zenml:zenml:0.53.0
-
cpe:2.3:a:zenml:zenml:0.53.1
-
cpe:2.3:a:zenml:zenml:0.54.0
-
cpe:2.3:a:zenml:zenml:0.54.1
-
cpe:2.3:a:zenml:zenml:0.55.0
-
cpe:2.3:a:zenml:zenml:0.55.1
-
cpe:2.3:a:zenml:zenml:0.55.2
-
cpe:2.3:a:zenml:zenml:0.55.3
-
cpe:2.3:a:zenml:zenml:0.55.4
-
cpe:2.3:a:zenml:zenml:0.55.5
-
cpe:2.3:a:zenml:zenml:0.56.0
-
cpe:2.3:a:zenml:zenml:0.56.1
-
cpe:2.3:a:zenml:zenml:0.56.2
-
cpe:2.3:a:zenml:zenml:0.6.0
-
cpe:2.3:a:zenml:zenml:0.6.1
-
cpe:2.3:a:zenml:zenml:0.6.2
-
cpe:2.3:a:zenml:zenml:0.6.3
-
cpe:2.3:a:zenml:zenml:0.7.0
-
cpe:2.3:a:zenml:zenml:0.7.1
-
cpe:2.3:a:zenml:zenml:0.7.2
-
cpe:2.3:a:zenml:zenml:0.7.3
-
cpe:2.3:a:zenml:zenml:0.8.0
-
cpe:2.3:a:zenml:zenml:0.8.1
-
cpe:2.3:a:zenml:zenml:0.9.0