Password hashing uses insecure MD5 and lacks random salt, upgrading to bcrypt in Opencast 8.
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | CVE-2020-5229 | 30 Jan 202020:15 | – | cve |
![]() | CVE-2020-5229 Opencast stores passwords using outdated MD5 hash algorithm | 30 Jan 202020:05 | – | cvelist |
![]() | CVE-2020-5229 | 5 Feb 202515:38 | – | redhatcve |
![]() | Default credentials | 30 Jan 202020:15 | – | prion |
![]() | Weak Encryption Standards | 31 Jan 202002:24 | – | veracode |
![]() | CVE-2020-5229 | 30 Jan 202020:15 | – | nvd |
![]() | CVE-2020-5229 | 30 Jan 202020:15 | – | osv |
![]() | Password Hashing: Do not use MD5 | 30 Jan 202021:21 | – | osv |
![]() | Opencast < 8.1.0 Password Hashing Vulnerability | 4 Feb 202000:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo