Описание
Typo 5.1.3 and earlier uses a hard-coded salt for calculating password hashes, which makes it easier for attackers to guess passwords via a brute force attack.
Ссылки
- Broken LinkVendor Advisory
- Broken Link
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkVendor Advisory
- Broken Link
- Broken LinkThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 5.1.3 (включая)
cpe:2.3:a:typosphere:typo:*:*:*:*:*:*:*:*
EPSS
Процентиль: 63%
0.00438
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-330
Связанные уязвимости
CVSS3: 7.5
ubuntu
больше 17 лет назад
Typo 5.1.3 and earlier uses a hard-coded salt for calculating password hashes, which makes it easier for attackers to guess passwords via a brute force attack.
CVSS3: 7.5
debian
больше 17 лет назад
Typo 5.1.3 and earlier uses a hard-coded salt for calculating password ...
CVSS3: 7.5
github
больше 3 лет назад
Typo 5.1.3 and earlier uses a hard-coded salt for calculating password hashes, which makes it easier for attackers to guess passwords via a brute force attack.
EPSS
Процентиль: 63%
0.00438
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-330