Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4588-3gxf-rhp2

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.

EPSS

Процентиль: 58%
0.00375
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.

nvd
больше 11 лет назад

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.

debian
больше 11 лет назад

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand functi ...

EPSS

Процентиль: 58%
0.00375
Низкий