CVE-2010-4728

Zikula before 1.3.1 uses the rand and srand PHP functions for random number generation, which makes it easier for remote attackers to defeat protection mechanisms based on randomization by predicting a return value, as demonstrated by the authid protection mechanism.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zikula:zikula_application_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:zikula:zikula_application_framework:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:zikula:zikula_application_framework:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:zikula:zikula_application_framework:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:zikula:zikula_application_framework:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:zikula:zikula_application_framework:1.2.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2011-02-08 22:00

Updated : 2024-02-04 17:54


NVD link : CVE-2010-4728

Mitre link : CVE-2010-4728

CVE.ORG link : CVE-2010-4728


JSON object : View

Products Affected

zikula

  • zikula_application_framework
CWE
CWE-310

Cryptographic Issues