Safety vulnerability ID: 54659
The information on this page was manually curated by our Cybersecurity Intelligence Team.
### Impact
We are incorporating the password policies listed in https://github.com/vantage6/vantage6/issues/59. One measure is that we don't let the user know in case of wrong username/password combination if the username actually exists, to prevent that bots can guess usernames. However, if a wrong password is entered a number of times, the user account is blocked temporarily. This way you could still find out which usernames exist.
### Patches
Update to 3.8.0+
### Workarounds
No
### References
https://github.com/vantage6/vantage6/issues/59
### For more information
If you have any questions or comments about this advisory:
* Email us at [[email protected]](mailto:[email protected])
Latest version: 4.8.2
vantage6 command line interface
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application