Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-6386

Опубликовано: 07 дек. 2013
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8

Описание

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

ignored

end of life
saucy

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

7.24-1
esm-apps/xenial

not-affected

7.24-1
esm-infra-legacy/trusty

not-affected

7.24-1
lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

end of life
trusty

not-affected

7.24-1

Показывать по

6.8 Medium

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.

debian
больше 11 лет назад

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand functi ...

github
около 3 лет назад

Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.

6.8 Medium

CVSS2

Уязвимость CVE-2013-6386