{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T07:33:02.265","vulnerabilities":[{"cve":{"id":"CVE-2023-51638","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2024-11-22T20:15:06.283","lastModified":"2025-01-03T20:19:29.350","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Allegra Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Allegra. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the configuration of a database. The issue results from the use of a hardcoded password. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-22360."},{"lang":"es","value":"Vulnerabilidad de omisión de autenticación de credenciales codificadas de forma rígida en Allegra. Esta vulnerabilidad permite a atacantes remotos omitir la autenticación en las instalaciones afectadas de Allegra. No se requiere autenticación para explotar esta vulnerabilidad. La falla específica existe dentro de la configuración de una base de datos. El problema es el resultado del uso de una contraseña codificada de forma rígida. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticación en el sistema. Era ZDI-CAN-22360."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-798"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*","versionEndExcluding":"7.5.1","matchCriteriaId":"21BACEA1-B578-4BE9-89BC-CA7C3F409FD8"}]}]}],"references":[{"url":"https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html","source":"zdi-disclosures@trendmicro.com","tags":["Release Notes"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-24-111/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]}]}}]}