Описание
The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack.
Ссылки
- Patch
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:gnu:mailman:1.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0:beta3:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0:beta4:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0:beta5:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.1b1:*:*:*:*:*:*:*
EPSS
Процентиль: 75%
0.00911
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
ubuntu
почти 21 год назад
The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack.
debian
почти 21 год назад
The password generation in mailman before 2.1.5 generates only 5 milli ...
github
больше 3 лет назад
The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack.
EPSS
Процентиль: 75%
0.00911
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other