Vulnerability Details CVE-2024-2260
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT tokens used for user authentication are not invalidated upon logout. This flaw allows an attacker to bypass authentication mechanisms by reusing a victim's JWT token.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.3%
CVSS Severity
CVSS v3 Score 4.2
Products affected by CVE-2024-2260
-
-
cpe:2.3:a:zenml:zenml:0.1.0
-
cpe:2.3:a:zenml:zenml:0.1.1
-
cpe:2.3:a:zenml:zenml:0.1.2
-
cpe:2.3:a:zenml:zenml:0.1.3
-
cpe:2.3:a:zenml:zenml:0.1.4
-
cpe:2.3:a:zenml:zenml:0.1.5
-
cpe:2.3:a:zenml:zenml:0.10.0
-
cpe:2.3:a:zenml:zenml:0.11.0
-
cpe:2.3:a:zenml:zenml:0.12.0
-
cpe:2.3:a:zenml:zenml:0.13.0
-
cpe:2.3:a:zenml:zenml:0.13.1
-
cpe:2.3:a:zenml:zenml:0.13.2
-
cpe:2.3:a:zenml:zenml:0.2.0
-
cpe:2.3:a:zenml:zenml:0.20.0
-
cpe:2.3:a:zenml:zenml:0.20.1
-
cpe:2.3:a:zenml:zenml:0.20.2
-
cpe:2.3:a:zenml:zenml:0.20.3
-
cpe:2.3:a:zenml:zenml:0.20.4
-
cpe:2.3:a:zenml:zenml:0.20.5
-
cpe:2.3:a:zenml:zenml:0.21.0
-
cpe:2.3:a:zenml:zenml:0.21.1
-
cpe:2.3:a:zenml:zenml:0.22.0
-
cpe:2.3:a:zenml:zenml:0.23.0
-
cpe:2.3:a:zenml:zenml:0.3.0
-
cpe:2.3:a:zenml:zenml:0.3.1
-
cpe:2.3:a:zenml:zenml:0.3.2
-
cpe:2.3:a:zenml:zenml:0.3.3
-
cpe:2.3:a:zenml:zenml:0.3.4
-
cpe:2.3:a:zenml:zenml:0.3.5
-
cpe:2.3:a:zenml:zenml:0.3.6
-
cpe:2.3:a:zenml:zenml:0.3.6.1
-
cpe:2.3:a:zenml:zenml:0.3.7
-
cpe:2.3:a:zenml:zenml:0.3.7.1
-
cpe:2.3:a:zenml:zenml:0.3.8
-
cpe:2.3:a:zenml:zenml:0.3.9
-
cpe:2.3:a:zenml:zenml:0.30.0
-
cpe:2.3:a:zenml:zenml:0.31.0
-
cpe:2.3:a:zenml:zenml:0.31.1
-
cpe:2.3:a:zenml:zenml:0.32.0
-
cpe:2.3:a:zenml:zenml:0.32.1
-
cpe:2.3:a:zenml:zenml:0.33.0
-
cpe:2.3:a:zenml:zenml:0.34.0
-
cpe:2.3:a:zenml:zenml:0.35.0
-
cpe:2.3:a:zenml:zenml:0.35.1
-
cpe:2.3:a:zenml:zenml:0.36.0
-
cpe:2.3:a:zenml:zenml:0.36.1
-
cpe:2.3:a:zenml:zenml:0.37.0
-
cpe:2.3:a:zenml:zenml:0.38.0
-
cpe:2.3:a:zenml:zenml:0.39.0
-
cpe:2.3:a:zenml:zenml:0.39.1
-
cpe:2.3:a:zenml:zenml:0.40.0
-
cpe:2.3:a:zenml:zenml:0.40.1
-
cpe:2.3:a:zenml:zenml:0.40.2
-
cpe:2.3:a:zenml:zenml:0.40.3
-
cpe:2.3:a:zenml:zenml:0.41.0
-
cpe:2.3:a:zenml:zenml:0.42.0
-
cpe:2.3:a:zenml:zenml:0.42.1
-
cpe:2.3:a:zenml:zenml:0.42.2
-
cpe:2.3:a:zenml:zenml:0.43.0
-
cpe:2.3:a:zenml:zenml:0.43.1
-
cpe:2.3:a:zenml:zenml:0.44.0
-
cpe:2.3:a:zenml:zenml:0.44.1
-
cpe:2.3:a:zenml:zenml:0.44.2
-
cpe:2.3:a:zenml:zenml:0.44.3
-
cpe:2.3:a:zenml:zenml:0.44.4
-
cpe:2.3:a:zenml:zenml:0.45.0
-
cpe:2.3:a:zenml:zenml:0.45.1
-
cpe:2.3:a:zenml:zenml:0.45.2
-
cpe:2.3:a:zenml:zenml:0.45.3
-
cpe:2.3:a:zenml:zenml:0.45.4
-
cpe:2.3:a:zenml:zenml:0.45.5
-
cpe:2.3:a:zenml:zenml:0.45.6
-
cpe:2.3:a:zenml:zenml:0.46.0
-
cpe:2.3:a:zenml:zenml:0.46.1
-
cpe:2.3:a:zenml:zenml:0.46.7
-
cpe:2.3:a:zenml:zenml:0.47.0
-
cpe:2.3:a:zenml:zenml:0.5.0
-
cpe:2.3:a:zenml:zenml:0.5.1
-
cpe:2.3:a:zenml:zenml:0.5.2
-
cpe:2.3:a:zenml:zenml:0.5.3
-
cpe:2.3:a:zenml:zenml:0.5.4
-
cpe:2.3:a:zenml:zenml:0.5.5
-
cpe:2.3:a:zenml:zenml:0.5.6
-
cpe:2.3:a:zenml:zenml:0.5.7
-
cpe:2.3:a:zenml:zenml:0.50.0
-
cpe:2.3:a:zenml:zenml:0.51.0
-
cpe:2.3:a:zenml:zenml:0.52.0
-
cpe:2.3:a:zenml:zenml:0.53.0
-
cpe:2.3:a:zenml:zenml:0.53.1
-
cpe:2.3:a:zenml:zenml:0.54.0
-
cpe:2.3:a:zenml:zenml:0.54.1
-
cpe:2.3:a:zenml:zenml:0.55.0
-
cpe:2.3:a:zenml:zenml:0.55.1
-
cpe:2.3:a:zenml:zenml:0.55.2
-
cpe:2.3:a:zenml:zenml:0.55.3
-
cpe:2.3:a:zenml:zenml:0.55.4
-
cpe:2.3:a:zenml:zenml:0.55.5
-
cpe:2.3:a:zenml:zenml:0.56.0
-
cpe:2.3:a:zenml:zenml:0.56.1
-
cpe:2.3:a:zenml:zenml:0.6.0
-
cpe:2.3:a:zenml:zenml:0.6.1
-
cpe:2.3:a:zenml:zenml:0.6.2
-
cpe:2.3:a:zenml:zenml:0.6.3
-
cpe:2.3:a:zenml:zenml:0.7.0
-
cpe:2.3:a:zenml:zenml:0.7.1
-
cpe:2.3:a:zenml:zenml:0.7.2
-
cpe:2.3:a:zenml:zenml:0.7.3
-
cpe:2.3:a:zenml:zenml:0.8.0
-
cpe:2.3:a:zenml:zenml:0.8.1
-
cpe:2.3:a:zenml:zenml:0.9.0