Joomla! 1.5 before 1.5.7 initializes PHP’s PRNG with a weak seed, which makes it easier for attackers to guess the pseudo-random values produced by PHP’s mt_rand function, as demonstrated by guessing password reset tokens, a different vulnerability than CVE-2008-3681.
developer.joomla.org/security/news/272-20080902-core-random-number-generation-flaw.html
marc.info/?l=oss-security&m=122115344915232&w=2
marc.info/?l=oss-security&m=122118210029084&w=2
marc.info/?l=oss-security&m=122152798516853&w=2
secunia.com/advisories/31789
securityreason.com/securityalert/4271
www.securityfocus.com/archive/1/496237/100/0/threaded
www.sektioneins.de/advisories/SE-2008-04.txt
www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/
exchange.xforce.ibmcloud.com/vulnerabilities/45068