account-recover.php in TorrentTrader Classic 1.09 chooses random passwords from an insufficiently large set, which makes it easier for remote attackers to obtain a password via a brute-force attack.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/504294/100/0/threaded | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/35369 | Broken Link Exploit Third Party Advisory VDB Entry |
http://www.waraxe.us/advisory-74.html | Exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51150 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/8958 | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/504294/100/0/threaded | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/35369 | Broken Link Exploit Third Party Advisory VDB Entry |
http://www.waraxe.us/advisory-74.html | Exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51150 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/8958 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2009-06-22 19:30
Updated : 2025-04-09 00:30
NVD link : CVE-2009-2158
Mitre link : CVE-2009-2158
CVE.ORG link : CVE-2009-2158
JSON object : View
Products Affected
torrenttrader_project
- torrenttrader
CWE
CWE-330
Use of Insufficiently Random Values