WebEOC before 6.0.2 uses a weak encryption scheme for passwords, which makes it easier for attackers to crack passwords.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/491770 | Patch Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/JGEI-6BWQDQ | Third Party Advisory US Government Resource |
Configurations
History
14 Feb 2024, 15:47
Type | Values Removed | Values Added |
---|---|---|
First Time |
Juvare
Juvare webeoc |
|
CPE | cpe:2.3:a:juvare:webeoc:*:*:*:*:*:*:*:* | |
References | (CONFIRM) http://www.kb.cert.org/vuls/id/JGEI-6BWQDQ - Third Party Advisory, US Government Resource | |
References | (CERT-VN) http://www.kb.cert.org/vuls/id/491770 - Patch, Third Party Advisory, US Government Resource | |
CWE | CWE-326 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
Information
Published : 2005-07-18 04:00
Updated : 2024-02-28 10:42
NVD link : CVE-2005-2281
Mitre link : CVE-2005-2281
CVE.ORG link : CVE-2005-2281
JSON object : View
Products Affected
juvare
- webeoc
CWE
CWE-326
Inadequate Encryption Strength