Untriaged
Permalink
CVE-2026-32865
9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
OPEXUS eComplaint and eCase insecure password reset
OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verification code in the HTTP response when requesting a password reset via 'ForcePasswordReset.aspx'. An attacker who knows an existing user's email address can reset the user's password and security questions. Existing security questions are not asked during the process.
Affected products
eCASE
- <10.1.0.0
- ==10.1.0.0
eComplaint
- <10.1.0.0
- ==10.1.0.0
Matching in nixpkgs
pkgs.haskellPackages.titlecase
Convert English Words to Title Case
pkgs.python312Packages.titlecase
Python library to capitalize strings as specified by the New York Times
pkgs.python313Packages.titlecase
Python library to capitalize strings as specified by the New York Times
pkgs.python314Packages.titlecase
Python library to capitalize strings as specified by the New York Times
Package maintainers
-
@peti Peter Simons <simons@cryp.to>