A vulnerability was determined in code-projects Chat System 1.0. Affected is an unknown function of the file update_user.php of the component MD5 Hash Handler. This manipulation of the argument Password causes use of weak hash. The attack is possible to be carried out remotely. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit has been publicly disclosed and may be utilized.
Metrics
Affected Vendors & Products
References
History
Mon, 27 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in code-projects Chat System 1.0. Affected is an unknown function of the file update_user.php of the component MD5 Hash Handler. This manipulation of the argument Password causes use of weak hash. The attack is possible to be carried out remotely. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit has been publicly disclosed and may be utilized. | |
| Title | code-projects Chat System MD5 Hash update_user.php weak hash | |
| First Time appeared |
Code-projects
Code-projects chat System |
|
| Weaknesses | CWE-327 CWE-328 |
|
| CPEs | cpe:2.3:a:code-projects:chat_system:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Code-projects
Code-projects chat System |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-27T08:30:10.652Z
Reserved: 2026-04-26T09:04:38.568Z
Link: CVE-2026-7103
No data.
Status : Received
Published: 2026-04-27T09:16:03.127
Modified: 2026-04-27T09:16:03.127
Link: CVE-2026-7103
No data.