CWE:
 

Sorry. No results for Bugtraq WLB2


CVEMAP Search Results

CVE
Details
Description
2024-03-01
Waiting for details
CVE-2024-23492

Updating...
 

 
A weak encoding is used to transmit credentials for WS203VICM.

 
2024-01-16
Waiting for details
CVE-2024-0556

Updating...
 

 
A Weak Cryptography for Passwords vulnerability has been detected on WIC200 affecting version 1.1. This vulnerability allows a remote user to intercept the traffic and retrieve the credentials from another user and decode it in base64 allowing the attacker to see the credentials in plain text.

 
2023-03-22
Waiting for details
CVE-2023-22271

Updating...
 

 
Experience Manager versions 6.5.15.0 (and earlier) are affected by a Weak Cryptography for Passwords vulnerability that can lead to a security feature bypass. A low-privileged attacker can exploit this in order to decrypt a user's password. The attack complexity is high since a successful exploitation requires to already have in possession this encrypted secret.

 
2023-01-26
Waiting for details
CVE-2023-0356

Updating...
 

 
SOCOMEC MODULYS GP Netvision versions 7.20 and prior lack strong encryption for credentials on HTTP connections, which could result in threat actors obtaining sensitive information.

 
2023-01-18
Waiting for details
CVE-2022-38469

Updating...
 

 
An unauthorized user with network access and the decryption key could decrypt sensitive data, such as usernames and passwords.

 
2022-09-06
Waiting for details
CVE-2022-35931

Updating...
 

 
Nextcloud Password Policy is an app that enables a Nextcloud server admin to define certain rules for passwords. Prior to versions 22.2.10, 23.0.7, and 24.0.3 the random password generator may, in very rare cases, generate common passwords that the validator itself would block. Upgrade Nextcloud Server to 22.2.10, 23.0.7 or 24.0.3 to receive a patch for the issue in Password Policy. There are no known workarounds available.

 
2020-07-23
Low
CVE-2020-10919

Updating...
 

 
This vulnerability allows remote attackers to disclose sensitive information on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. When transmitting passwords, the process encrypts them in a recoverable format using a hard-coded key. An attacker can leverage this vulnerability to disclose credentials, leading to further compromise. Was ZDI-CAN-10185.

 

 


Copyright 2024, cxsecurity.com

 

Back to Top