Логотип exploitDog
bind:CVE-2001-1467
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2001-1467

Количество 3

Количество 3

nvd логотип

CVE-2001-1467

больше 24 лет назад

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2001-1467

больше 24 лет назад

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, se ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-f6m6-f2pm-2grw

больше 3 лет назад

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2001-1467

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

CVSS2: 7.5
1%
Низкий
больше 24 лет назад
debian логотип
CVE-2001-1467

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, se ...

CVSS2: 7.5
1%
Низкий
больше 24 лет назад
github логотип
GHSA-f6m6-f2pm-2grw

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу