Описание
Typo 5.1.3 and earlier uses a hard-coded salt for calculating password hashes, which makes it easier for attackers to guess passwords via a brute force attack.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | end of life |
| devel | not-affected | |
| gutsy | ignored | end of life, was needed |
| hardy | not-affected | |
| intrepid | not-affected | |
| jaunty | not-affected | |
| karmic | not-affected | |
| upstream | not-affected |
Показывать по
10
Ссылки на источники
EPSS
Процентиль: 63%
0.00438
Низкий
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
CVSS3: 7.5
nvd
больше 17 лет назад
Typo 5.1.3 and earlier uses a hard-coded salt for calculating password hashes, which makes it easier for attackers to guess passwords via a brute force attack.
CVSS3: 7.5
debian
больше 17 лет назад
Typo 5.1.3 and earlier uses a hard-coded salt for calculating password ...
CVSS3: 7.5
github
больше 3 лет назад
Typo 5.1.3 and earlier uses a hard-coded salt for calculating password hashes, which makes it easier for attackers to guess passwords via a brute force attack.
EPSS
Процентиль: 63%
0.00438
Низкий
5 Medium
CVSS2
7.5 High
CVSS3