Логотип exploitDog
bind:CVE-2001-1467
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2001-1467

Количество 3

Количество 3

nvd логотип

CVE-2001-1467

около 24 лет назад

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2001-1467

около 24 лет назад

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, se ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-f6m6-f2pm-2grw

около 3 лет назад

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2001-1467

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

CVSS2: 7.5
1%
Низкий
около 24 лет назад
debian логотип
CVE-2001-1467

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, se ...

CVSS2: 7.5
1%
Низкий
около 24 лет назад
github логотип
GHSA-f6m6-f2pm-2grw

mkpasswd in expect 5.2.8, as used by Red Hat Linux 6.2 through 7.0, seeds its random number generator with its process ID, which limits the space of possible seeds and makes it easier for attackers to conduct brute force password attacks.

1%
Низкий
около 3 лет назад

Уязвимостей на страницу