Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-1581

Опубликовано: 09 сент. 2012
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5

Описание

MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 uses weak random numbers for password reset tokens, which makes it easier for remote attackers to change the passwords of arbitrary users. Any extension developers using mt_rand() to generate random numbers in contexts where security is required are encouraged to instead make use of the MWCryptRand class introduced with this release.

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [1:1.15.5-9]]
hardy

ignored

end of life
lucid

ignored

end of life
maverick

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needs-triage
quantal

not-affected

1:1.15.5-9

Показывать по

EPSS

Процентиль: 67%
0.00539
Низкий

5 Medium

CVSS2

Связанные уязвимости

nvd
больше 13 лет назад

MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 uses weak random numbers for password reset tokens, which makes it easier for remote attackers to change the passwords of arbitrary users.

debian
больше 13 лет назад

MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 uses weak rand ...

github
больше 3 лет назад

MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 uses weak random numbers for password reset tokens, which makes it easier for remote attackers to change the passwords of arbitrary users.

EPSS

Процентиль: 67%
0.00539
Низкий

5 Medium

CVSS2