Количество 3
Количество 3

CVE-2001-1467
mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.
CVE-2001-1467
mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, se ...
GHSA-f6m6-f2pm-2grw
mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2001-1467 mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks. | CVSS2: 7.5 | 1% Низкий | около 24 лет назад |
CVE-2001-1467 mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, se ... | CVSS2: 7.5 | 1% Низкий | около 24 лет назад | |
GHSA-f6m6-f2pm-2grw mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks. | 1% Низкий | около 3 лет назад |
Уязвимостей на страницу