Логотип exploitDog
bind:CVE-2001-1467
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2001-1467

Количество 3

Количество 3

nvd логотип

CVE-2001-1467

почти 25 лет назад

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2001-1467

почти 25 лет назад

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, se ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-f6m6-f2pm-2grw

почти 4 года назад

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2001-1467

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

CVSS2: 7.5
1%
Низкий
почти 25 лет назад
debian логотип
CVE-2001-1467

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, se ...

CVSS2: 7.5
1%
Низкий
почти 25 лет назад
github логотип
GHSA-f6m6-f2pm-2grw

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

1%
Низкий
почти 4 года назад

Уязвимостей на страницу