Use of Password Hash With Insufficient Computational Effort vulnerability in percona percona-toolkit allows Encryption Brute Forcing.This issue affects percona-toolkit: 3.6.0.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 15 Dec 2024 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Use of Password Hash With Insufficient Computational Effort vulnerability in percona percona-toolkit allows Encryption Brute Forcing.This issue affects percona-toolkit: 3.6.0. | |
Title | Misuse of SHA256 to create an encryption key | |
Weaknesses | CWE-916 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: CyberArk
Published: 2024-12-15T10:56:26.124Z
Updated: 2024-12-16T16:41:35.354Z
Reserved: 2024-08-12T12:50:54.839Z
Link: CVE-2024-7701
Vulnrichment
Updated: 2024-12-16T16:41:28.117Z
NVD
Status : Received
Published: 2024-12-15T11:15:05.387
Modified: 2024-12-15T11:15:05.387
Link: CVE-2024-7701
Redhat
No data.