CVE-2016-5100

Froxlor before 0.9.35 uses the PHP rand function for random number generation, which makes it easier for remote attackers to guess the password reset token by predicting a value.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:53

Type Values Removed Values Added
References () https://github.com/Froxlor/Froxlor/commit/da4ec3e1b591de96675817a009e26e05e848a6ba - Issue Tracking, Patch, Third Party Advisory () https://github.com/Froxlor/Froxlor/commit/da4ec3e1b591de96675817a009e26e05e848a6ba - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2017-02-13 18:59

Updated : 2024-11-21 02:53


NVD link : CVE-2016-5100

Mitre link : CVE-2016-5100

CVE.ORG link : CVE-2016-5100


JSON object : View

Products Affected

froxlor

  • froxlor
CWE
CWE-330

Use of Insufficiently Random Values