Description
MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods.
Remediation
References
Related Vulnerabilities
Riot.js Resource Management Errors Vulnerability (CVE-2016-10527)
Magento Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2019-7864)
XWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2022-36095)
Atlassian Jira Insufficient Session Expiration Vulnerability (CVE-2021-39113)