Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rfvr-jph4-c6j4

Опубликовано: 19 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

EzGED3 3.5.0 stores user passwords using an insecure hashing scheme: md5(md5(password)). This hashing method is cryptographically weak and allows attackers to perform efficient offline brute-force attacks if password hashes are disclosed. The lack of salting and use of a fast, outdated algorithm makes it feasible to recover plaintext credentials using precomputed tables or GPU-based cracking tools. The vendor states that the issue is fixed in 3.5.72.27183.

EzGED3 3.5.0 stores user passwords using an insecure hashing scheme: md5(md5(password)). This hashing method is cryptographically weak and allows attackers to perform efficient offline brute-force attacks if password hashes are disclosed. The lack of salting and use of a fast, outdated algorithm makes it feasible to recover plaintext credentials using precomputed tables or GPU-based cracking tools. The vendor states that the issue is fixed in 3.5.72.27183.

EPSS

Процентиль: 11%
0.00038
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-260

Связанные уязвимости

CVSS3: 5.3
nvd
6 месяцев назад

EzGED3 3.5.0 stores user passwords using an insecure hashing scheme: md5(md5(password)). This hashing method is cryptographically weak and allows attackers to perform efficient offline brute-force attacks if password hashes are disclosed. The lack of salting and use of a fast, outdated algorithm makes it feasible to recover plaintext credentials using precomputed tables or GPU-based cracking tools. The vendor states that the issue is fixed in 3.5.72.27183.

EPSS

Процентиль: 11%
0.00038
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-260