CVE-2009-2951
24.08.2009, 15:30
Phenotype CMS before 2.9 does not use a random salt value for password encryption, which makes it easier for context-dependent attackers to determine cleartext passwords.Enginsight
Vendor | Product | Version |
---|---|---|
phenotype-cms | phenotype_cms | 𝑥 ≤ 2.8 |
phenotype-cms | phenotype_cms | 1.0 |
phenotype-cms | phenotype_cms | 2.0 |
phenotype-cms | phenotype_cms | 2.1 |
phenotype-cms | phenotype_cms | 2.2 |
phenotype-cms | phenotype_cms | 2.3 |
phenotype-cms | phenotype_cms | 2.4 |
phenotype-cms | phenotype_cms | 2.5 |
phenotype-cms | phenotype_cms | 2.5.1 |
phenotype-cms | phenotype_cms | 2.6 |
phenotype-cms | phenotype_cms | 2.7 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration