The software uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input.This makes it easier for attackers to pre-compute the hash value using dictionary attack techniques such as rainbow tables.