CVE-2024-38881

An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to perform a Rainbow Table Password cracking attack due to the use of one-way hashes without salts when storing user passwords.
Configurations

Configuration 1 (hide)

cpe:2.3:a:horizoncloud:caterease:*:*:*:*:*:*:*:*

History

06 May 2025, 16:30

Type Values Removed Values Added
First Time Horizoncloud
Horizoncloud caterease
CPE cpe:2.3:a:horizoncloud:caterease:*:*:*:*:*:*:*:*
References () http://caterease.com - () http://caterease.com - Product
References () http://horizon.com - () http://horizon.com - Product
References () https://packetstormsecurity.com/files/179892/Caterease-Software-SQL-Injection-Command-Injection-Bypass.html - () https://packetstormsecurity.com/files/179892/Caterease-Software-SQL-Injection-Command-Injection-Bypass.html - Third Party Advisory
References () https://vuldb.com/?id.273365 - () https://vuldb.com/?id.273365 - Third Party Advisory, VDB Entry

Information

Published : 2024-08-02 18:16

Updated : 2025-05-06 16:30


NVD link : CVE-2024-38881

Mitre link : CVE-2024-38881

CVE.ORG link : CVE-2024-38881


JSON object : View

Products Affected

horizoncloud

  • caterease
CWE
CWE-760

Use of a One-Way Hash with a Predictable Salt