Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7rf5-g36v-wpjh

Опубликовано: 20 фев. 2022
Источник: github
Github: Не прошло ревью

Описание

sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

EPSS

Процентиль: 53%
0.00307
Низкий

Дефекты

CWE-770

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 4 года назад

sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

CVSS3: 7.5
nvd
почти 4 года назад

sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

CVSS3: 7.5
debian
почти 4 года назад

sha256crypt and sha512crypt through 0.6 allow attackers to cause a den ...

EPSS

Процентиль: 53%
0.00307
Низкий

Дефекты

CWE-770