Vulnerability Details : CVE-2006-4068
The pswd.js script relies on the client to calculate whether a username and password match hard-coded hashed values for a server, and uses a hashing scheme that creates a large number of collisions, which makes it easier for remote attackers to conduct offline brute force attacks. NOTE: this script might also allow attackers to generate the server-side "secret" URL without determining the original password, but this possibility was not discussed by the original researcher.
Exploit prediction scoring system (EPSS) score for CVE-2006-4068
Probability of exploitation activity in the next 30 days: 2.85%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-4068
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2006-4068
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-4068
-
http://www.securityfocus.com/archive/1/442120
Exploit;Vendor Advisory
-
http://securityreason.com/securityalert/1362
-
http://www.securityfocus.com/bid/19333
Exploit
Products affected by CVE-2006-4068
- cpe:2.3:a:pswd.js:pswd.js:*:*:*:*:*:*:*:*