CVE-2008-4905

Typo 5.1.3 and earlier uses a hard-coded salt for calculating password hashes, which makes it easier for attackers to guess passwords via a brute force attack.
References
Link Resource
http://secunia.com/advisories/32272 Broken Link Vendor Advisory
http://securityreason.com/securityalert/4550 Broken Link
http://www.securityfocus.com/archive/1/497970 Broken Link Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:typosphere:typo:*:*:*:*:*:*:*:*

History

09 Feb 2024, 03:05

Type Values Removed Values Added
References () http://secunia.com/advisories/32272 - Vendor Advisory () http://secunia.com/advisories/32272 - Broken Link, Vendor Advisory
References () http://securityreason.com/securityalert/4550 - () http://securityreason.com/securityalert/4550 - Broken Link
References () http://www.securityfocus.com/archive/1/497970 - () http://www.securityfocus.com/archive/1/497970 - Broken Link, Third Party Advisory, VDB Entry
CWE CWE-310 CWE-330
CVSS v2 : 5.0
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:typosphere:typo:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:3.99.1:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:3.99.4:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.5.8:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:3.99.3:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:1.6:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:5.0.3.98.1:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:3.99.2:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:3.99.0:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:5.1:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:5.0.3.98:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:typosphere:typo:2.0.6:*:*:*:*:*:*:*

Information

Published : 2008-11-04 00:58

Updated : 2024-02-09 03:05


NVD link : CVE-2008-4905

Mitre link : CVE-2008-4905

CVE.ORG link : CVE-2008-4905


JSON object : View

Products Affected

typosphere

  • typo
CWE
CWE-330

Use of Insufficiently Random Values