Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an malicious user to conduct brute force password guessing.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
arkeia arkeia 4.2.8-2 |
||
arkeia arkeia 4.2 |