Exploit Report

Computer Security And Bug Information

CVE-2023-23929

CVECVE-2023-23929
CVE Title
Published Date2023-03-04T00:15Z
Modified Date2023-03-10T15:06Z
CWE TypeCWE-613
CVSS 3.xCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Descriptionvantage6 is a privacy preserving federated learning infrastructure for secure insight exchange. Currently, the refresh token is valid indefinitely. The refresh token should get a validity of 24-48 hours. A fix was released in version 3.8.0.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://github.com/vantage6/vantage6/commit/48ebfca42359e9a6743e9598684585e2522cdce8
Reference DescriptionMISC https://github.com/vantage6/vantage6/commit/48ebfca42359e9a6743e9598684585e2522cdce8
Reference URLhttps://github.com/vantage6/vantage6/security/advisories/GHSA-4w59-c3gc-rrhp
Reference DescriptionMISC https://github.com/vantage6/vantage6/security/advisories/GHSA-4w59-c3gc-rrhp
TagsPatch
Sources NIST MITRE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles