Use of a Broken or Risky Cryptographic Algorithm, Use of...
Moderate severity
Unreviewed
Published
Mar 19, 2025
to the GitHub Advisory Database
•
Updated Jul 2, 2025
Description
Published by the National Vulnerability Database
Mar 19, 2025
Published to the GitHub Advisory Database
Mar 19, 2025
Last updated
Jul 2, 2025
Use of a Broken or Risky Cryptographic Algorithm, Use of Password Hash
With Insufficient Computational Effort, Use of Weak Hash, Use of a
One-Way Hash with a Predictable Salt vulnerability in Beta80 Life 1st
allows an
Attacker to Bruteforce User
Passwords or find a collision to gain access to a target application using BETA80
“Life 1st Identity Manager” as a service for authentication.This issue affects Life 1st: 1.5.2.14234.
References