actions.php in WebPortal CMS 0.6-beta generates predictable passwords containing only the time of day, which makes it easier for remote attackers to obtain access to any account via a lostpass action.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/27145 | Broken Link Exploit Third Party Advisory VDB Entry | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/39486 | VDB Entry | 
| https://www.exploit-db.com/exploits/4835 | Exploit Third Party Advisory VDB Entry | 
| http://www.securityfocus.com/bid/27145 | Broken Link Exploit Third Party Advisory VDB Entry | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/39486 | VDB Entry | 
| https://www.exploit-db.com/exploits/4835 | Exploit Third Party Advisory VDB Entry | 
Configurations
                    History
                    No history.
Information
                Published : 2008-01-08 19:46
Updated : 2025-04-09 00:30
NVD link : CVE-2008-0141
Mitre link : CVE-2008-0141
CVE.ORG link : CVE-2008-0141
JSON object : View
Products Affected
                webportal_cms_project
- webportal_cms
CWE
                
                    
                        
                        CWE-330
                        
            Use of Insufficiently Random Values
