Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m9h2-f9w3-462f

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

solid.exe in IBM solidDB before 4.5.181, 6.0.x before 6.0.1067, 6.1.x and 6.3.x before 6.3.47, and 6.5.x before 6.5.0.3 uses a password-hash length specified by the client, which allows remote attackers to bypass authentication via a short length value.

solid.exe in IBM solidDB before 4.5.181, 6.0.x before 6.0.1067, 6.1.x and 6.3.x before 6.3.47, and 6.5.x before 6.5.0.3 uses a password-hash length specified by the client, which allows remote attackers to bypass authentication via a short length value.

EPSS

Процентиль: 71%
0.00659
Низкий

Связанные уязвимости

nvd
почти 15 лет назад

solid.exe in IBM solidDB before 4.5.181, 6.0.x before 6.0.1067, 6.1.x and 6.3.x before 6.3.47, and 6.5.x before 6.5.0.3 uses a password-hash length specified by the client, which allows remote attackers to bypass authentication via a short length value.

EPSS

Процентиль: 71%
0.00659
Низкий