cpe:/a:joomla:joomla:1.5 cpe:/a:joomla:joomla:1.5.1 cpe:/a:joomla:joomla:1.5.2 cpe:/a:joomla:joomla:1.5.3 cpe:/a:joomla:joomla:1.5.4 cpe:/a:joomla:joomla:1.5.5 cpe:/a:joomla:joomla:1.5.6 CVE-2008-4102 2008-09-18T13:59:32.907-04:00 2017-08-07T21:32:25.233-04:00 7.5 NETWORK LOW NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2008-09-19T08:16:00.000-04:00 ALLOWS_OTHER_ACCESS BUGTRAQ 20080911 Advisory 04/2008: Joomla Weak Random Password Reset Token Vulnerability SECUNIA 31789 SREASON 4271 MLIST [oss-security] 20080911 CVE request for Joomla multiple vuln. MLIST [oss-security] 20080911 CVE request: joomla < 1.5.7 MLIST [oss-security] 20080916 Re: CVE request: joomla < 1.5.7 CONFIRM http://developer.joomla.org/security/news/272-20080902-core-random-number-generation-flaw.html MISC http://www.sektioneins.de/advisories/SE-2008-04.txt MISC http://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/ XF joomla-randomnumbers-info-disclosure(45068) Joomla! 1.5 before 1.5.7 initializes PHP's PRNG with a weak seed, which makes it easier for attackers to guess the pseudo-random values produced by PHP's mt_rand function, as demonstrated by guessing password reset tokens, a different vulnerability than CVE-2008-3681.