Логотип exploitDog
bind:CVE-2021-23128
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-23128

Количество 2

Количество 2

nvd логотип

CVE-2021-23128

почти 5 лет назад

An issue was discovered in Joomla! 3.2.0 through 3.9.24. The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been replaced with a call to 'random_bytes()' and its backport that is shipped within random_compat.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-7h2v-2fwm-pjjh

больше 3 лет назад

An issue was discovered in Joomla! 3.2.0 through 3.9.24. The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been replaced with a call to 'random_bytes()' and its backport that is shipped within random_compat.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-23128

An issue was discovered in Joomla! 3.2.0 through 3.9.24. The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been replaced with a call to 'random_bytes()' and its backport that is shipped within random_compat.

CVSS3: 9.1
0%
Низкий
почти 5 лет назад
github логотип
GHSA-7h2v-2fwm-pjjh

An issue was discovered in Joomla! 3.2.0 through 3.9.24. The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been replaced with a call to 'random_bytes()' and its backport that is shipped within random_compat.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу