Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cp48-2wcf-rx78

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Joomla! 1.5 before 1.5.7 initializes PHP's PRNG with a weak seed, which makes it easier for attackers to guess the pseudo-random values produced by PHP's mt_rand function, as demonstrated by guessing password reset tokens, a different vulnerability than CVE-2008-3681.

Joomla! 1.5 before 1.5.7 initializes PHP's PRNG with a weak seed, which makes it easier for attackers to guess the pseudo-random values produced by PHP's mt_rand function, as demonstrated by guessing password reset tokens, a different vulnerability than CVE-2008-3681.

EPSS

Процентиль: 22%
0.00072
Низкий

Связанные уязвимости

nvd
больше 17 лет назад

Joomla! 1.5 before 1.5.7 initializes PHP's PRNG with a weak seed, which makes it easier for attackers to guess the pseudo-random values produced by PHP's mt_rand function, as demonstrated by guessing password reset tokens, a different vulnerability than CVE-2008-3681.

EPSS

Процентиль: 22%
0.00072
Низкий