Логотип exploitDog
bind:CVE-2016-3735
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-3735

Количество 3

Количество 3

nvd логотип

CVE-2016-3735

около 4 лет назад

Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2016-3735

около 4 лет назад

Piwigo is image gallery software written in PHP. When a criteria is no ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-82rp-xg3c-hxpx

около 4 лет назад

Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset.

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-3735

Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset.

CVSS3: 8.1
2%
Низкий
около 4 лет назад
debian логотип
CVE-2016-3735

Piwigo is image gallery software written in PHP. When a criteria is no ...

CVSS3: 8.1
2%
Низкий
около 4 лет назад
github логотип
GHSA-82rp-xg3c-hxpx

Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset.

CVSS3: 8.1
2%
Низкий
около 4 лет назад

Уязвимостей на страницу