Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2009-4269

The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 72.8%
CVSS Severity
CVSS v2 Score 2.1
References
Products affected by CVE-2009-4269
  • Apache » Derby » Version: N/A
    cpe:2.3:a:apache:derby:-
  • Apache » Derby » Version: 10.0.2.1
    cpe:2.3:a:apache:derby:10.0.2.1
  • Apache » Derby » Version: 10.1.1.0
    cpe:2.3:a:apache:derby:10.1.1.0
  • Apache » Derby » Version: 10.1.2.1
    cpe:2.3:a:apache:derby:10.1.2.1
  • Apache » Derby » Version: 10.1.3.1
    cpe:2.3:a:apache:derby:10.1.3.1
  • Apache » Derby » Version: 10.2.1.6
    cpe:2.3:a:apache:derby:10.2.1.6
  • Apache » Derby » Version: 10.2.2.0
    cpe:2.3:a:apache:derby:10.2.2.0
  • Apache » Derby » Version: 10.3.1.4
    cpe:2.3:a:apache:derby:10.3.1.4
  • Apache » Derby » Version: 10.3.2.1
    cpe:2.3:a:apache:derby:10.3.2.1
  • Apache » Derby » Version: 10.3.3.0
    cpe:2.3:a:apache:derby:10.3.3.0
  • Apache » Derby » Version: 10.4.1.3
    cpe:2.3:a:apache:derby:10.4.1.3
  • Apache » Derby » Version: 10.4.2.0
    cpe:2.3:a:apache:derby:10.4.2.0
  • Apache » Derby » Version: 10.5.1.1
    cpe:2.3:a:apache:derby:10.5.1.1
  • Apache » Derby » Version: 10.5.2.0
    cpe:2.3:a:apache:derby:10.5.2.0
  • Apache » Derby » Version: 10.5.3.0
    cpe:2.3:a:apache:derby:10.5.3.0


Contact Us

Shodan ® - All rights reserved