Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6386

Опубликовано: 07 дек. 2013
Источник: debian
EPSS Низкий

Описание

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
drupal6removedpackage
drupal7fixed7.24-1package

Примечания

  • https://drupal.org/SA-CORE-2013-003

EPSS

Процентиль: 59%
0.00375
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.

nvd
около 12 лет назад

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.

github
больше 3 лет назад

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.

EPSS

Процентиль: 59%
0.00375
Низкий