Vulnerability Details CVE-2024-40761
Inadequate Encryption Strength vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.3.5.
Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead.
Users are recommended to upgrade to version 1.4.0, which fixes the issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.014
EPSS Ranking 79.4%
CVSS Severity
CVSS v3 Score 5.3
Products affected by CVE-2024-40761
-
cpe:2.3:a:apache:answer:-
-
cpe:2.3:a:apache:answer:0.2.0
-
cpe:2.3:a:apache:answer:0.3.0
-
cpe:2.3:a:apache:answer:0.4.0
-
cpe:2.3:a:apache:answer:0.4.1
-
cpe:2.3:a:apache:answer:0.4.2
-
cpe:2.3:a:apache:answer:0.5.0
-
cpe:2.3:a:apache:answer:1.0.0
-
cpe:2.3:a:apache:answer:1.0.1
-
cpe:2.3:a:apache:answer:1.0.2
-
cpe:2.3:a:apache:answer:1.0.3
-
cpe:2.3:a:apache:answer:1.0.4
-
cpe:2.3:a:apache:answer:1.0.5
-
cpe:2.3:a:apache:answer:1.0.6
-
cpe:2.3:a:apache:answer:1.0.7
-
cpe:2.3:a:apache:answer:1.0.8
-
cpe:2.3:a:apache:answer:1.0.9
-
cpe:2.3:a:apache:answer:1.1.0
-
cpe:2.3:a:apache:answer:1.1.1
-
cpe:2.3:a:apache:answer:1.1.2
-
cpe:2.3:a:apache:answer:1.1.3
-
cpe:2.3:a:apache:answer:1.2.0
-
cpe:2.3:a:apache:answer:1.2.1
-
cpe:2.3:a:apache:answer:1.2.5
-
cpe:2.3:a:apache:answer:1.3.0
-
cpe:2.3:a:apache:answer:1.3.1
-
cpe:2.3:a:apache:answer:1.3.5