CWE:
 

Tytuł
Data
Autor
High
Infoblox 6.8.4.x Weak MySQL Password
10.07.2014
Nate Kettlewell


Common Weakness Enumeration (CWE)

CVE
Szczegóły
Opis
2024-04-13
Waiting for details
CVE-2024-3735

Updating...
 

 
A vulnerability was found in Smart Office up to 20240405. It has been classified as problematic. Affected is an unknown function of the file Main.aspx. The manipulation of the argument New Password/Confirm Password with the input 1 leads to weak password requirements. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-260574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

 
2024-03-01
Waiting for details
CVE-2023-50305

Updating...
 

 
IBM Engineering Requirements Management DOORS 9.7.2.7 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 273336.

 
2024-02-19
Waiting for details
CVE-2024-1345

Updating...
 

 
Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to perform a brute force attack and easily discover the root password.

 
Waiting for details
CVE-2024-1346

Updating...
 

 
Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.

 
2024-02-07
Waiting for details
CVE-2023-38369

Updating...
 

 
IBM Security Access Manager Container 10.0.0.0 through 10.0.6.1 does not require that docker images should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 261196.

 
2024-01-30
Waiting for details
CVE-2024-0676

Updating...
 

 
Weak password requirement vulnerability in Lamassu Bitcoin ATM Douro machines, in its 7.1 version , which allows a local user to interact with the machine where the application is installed, retrieve stored hashes from the machine and crack long 4-character passwords using a dictionary attack.

 
2024-01-09
Waiting for details
CVE-2024-0347

Updating...
 

 
A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as problematic. This issue affects some unknown processing of the file signup_teacher.php. The manipulation of the argument Password leads to weak password requirements. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250115.

 
2024-01-02
Waiting for details
CVE-2024-0188

Updating...
 

 
A vulnerability, which was classified as problematic, was found in RRJ Nueva Ecija Engineer Online Portal 1.0. This affects an unknown part of the file change_password_teacher.php. The manipulation leads to weak password requirements. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-249501 was assigned to this vulnerability.

 
2023-12-22
Waiting for details
CVE-2023-7053

Updating...
 

 
A vulnerability was found in PHPGurukul Online Notes Sharing System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /user/signup.php. The manipulation leads to weak password requirements. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248740.

 
2023-08-03
Waiting for details
CVE-2023-4125

Updating...
 

 
Weak Password Requirements in GitHub repository answerdev/answer prior to v1.1.0.

 

 


Copyright 2024, cxsecurity.com

 

Back to Top