Show filters
53 Total Results
Displaying 11-20 of 53
Sort by:
Attacker Value
Unknown
CVE-2021-28914
Disclosure Date: September 09, 2021 (last updated February 23, 2025)
BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow the user to set a weak password because the strength is shown in configuration tool, but finally not enforced. This is usable and part of an attack chain to gain SSH root access.
0
Attacker Value
Unknown
CVE-2021-28912
Disclosure Date: September 09, 2021 (last updated February 23, 2025)
BAB TECHNOLOGIE GmbH eibPort V3. Each device has its own unique hard coded and weak root SSH key passphrase known as 'eibPort string'. This is usable and the final part of an attack chain to gain SSH root access.
0
Attacker Value
Unknown
CVE-2021-20418
Disclosure Date: August 10, 2021 (last updated February 23, 2025)
IBM Security Guardium 11.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 196279.
0
Attacker Value
Unknown
CVE-2021-1522
Disclosure Date: August 04, 2021 (last updated February 23, 2025)
A vulnerability in the change password API of Cisco Connected Mobile Experiences (CMX) could allow an authenticated, remote attacker to alter their own password to a value that does not comply with the strong authentication requirements that are configured on an affected device. This vulnerability exists because a password policy check is incomplete at the time a password is changed at server side using the API. An attacker could exploit this vulnerability by sending a specially crafted API request to the affected device. A successful exploit could allow the attacker to change their own password to a value that does not comply with the configured strong authentication requirements.
0
Attacker Value
Unknown
CVE-2021-32753
Disclosure Date: July 09, 2021 (last updated February 23, 2025)
EdgeX Foundry is an open source project for building a common open framework for internet-of-things edge computing. A vulnerability exists in the Edinburgh, Fuji, Geneva, and Hanoi versions of the software. When the EdgeX API gateway is configured for OAuth2 authentication and a proxy user is created, the client_id and client_secret required to obtain an OAuth2 authentication token are set to the username of the proxy user. A remote network attacker can then perform a dictionary-based password attack on the OAuth2 token endpoint of the API gateway to obtain an OAuth2 authentication token and use that token to make authenticated calls to EdgeX microservices from an untrusted network. OAuth2 is the default authentication method in EdgeX Edinburgh release. The default authentication method was changed to JWT in Fuji and later releases. Users should upgrade to the EdgeX Ireland release to obtain the fix. The OAuth2 authentication method is disabled in Ireland release. If unable to upgrade…
0
Attacker Value
Unknown
CVE-2021-25923
Disclosure Date: June 24, 2021 (last updated February 22, 2025)
In OpenEMR, versions 5.0.0 to 6.0.0.1 are vulnerable to weak password requirements as it does not enforce a maximum password length limit. If a malicious user is aware of the first 72 characters of the victim user’s password, he can leverage it to an account takeover.
0
Attacker Value
Unknown
CVE-2021-25839
Disclosure Date: April 26, 2021 (last updated February 22, 2025)
A weak password requirement vulnerability exists in the Create New User function of MintHCM RELEASE 3.0.8, which could lead an attacker to easier password brute-forcing.
0
Attacker Value
Unknown
CVE-2021-26797
Disclosure Date: April 26, 2021 (last updated February 22, 2025)
An access control vulnerability in Hame SD1 Wi-Fi firmware <=V.20140224154640 allows an attacker to get system administrator through an open Telnet service.
0
Attacker Value
Unknown
CVE-2020-11925
Disclosure Date: April 02, 2021 (last updated February 22, 2025)
An issue was discovered in Luvion Grand Elite 3 Connect through 2020-02-25. Authentication to the device is based on a username and password. The root credentials are the same across all devices of this model.
0
Attacker Value
Unknown
CVE-2020-8296
Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured.
0