Typo 5.1.3 and earlier uses a hard-coded salt for calculating password hashes, which makes it easier for attackers to guess passwords via a brute force attack.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/497970 | mailing list vdb entry third party advisory broken link |
http://secunia.com/advisories/32272 | broken link third party advisory vendor advisory |
http://securityreason.com/securityalert/4550 | third party advisory broken link |