Show filters
80 Total Results
Displaying 71-80 of 80
Sort by:
Attacker Value
Unknown

CVE-2020-11966

Disclosure Date: April 21, 2020 (last updated February 21, 2025)
In IQrouter through 3.3.1, the Lua function reset_password in the web-panel allows remote attackers to change the root password arbitrarily. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time”
Attacker Value
Unknown

CVE-2019-19093

Disclosure Date: April 02, 2020 (last updated February 21, 2025)
eSOMS versions 4.0 to 6.0.3 do not enforce password complexity settings, potentially resulting in lower access security due to insecure user passwords.
Attacker Value
Unknown

CVE-2020-6991

Disclosure Date: March 24, 2020 (last updated February 21, 2025)
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force.
Attacker Value
Unknown

CVE-2020-6995

Disclosure Date: March 24, 2020 (last updated February 21, 2025)
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unauthorized access.
Attacker Value
Unknown

CVE-2019-6558

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
In Auto-Maskin RP210E Versions 3.7 and prior, DCU210E Versions 3.7 and prior and Marine Observer Pro (Android App), the software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
Attacker Value
Unknown

CVE-2019-9096

Disclosure Date: March 11, 2020 (last updated February 21, 2025)
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. Insufficient password requirements for the MGate web application may allow an attacker to gain access by brute-forcing account passwords.
Attacker Value
Unknown

CVE-2020-9023

Disclosure Date: February 17, 2020 (last updated February 21, 2025)
Iteris Vantage Velocity Field Unit 2.3.1 and 2.4.2 devices have two users that are not documented and are configured with weak passwords (User bluetooth, password bluetooth; User eclipse, password eclipse). Also, bluetooth is the root password.
Attacker Value
Unknown

CVE-2020-8988

Disclosure Date: February 13, 2020 (last updated February 21, 2025)
The Voatz application 2020-01-01 for Android allows only 100 million different PINs, which makes it easier for attackers (after using root access to make a copy of the local database) to discover login credentials and voting history via an offline brute-force approach.
Attacker Value
Unknown

CVE-2020-8632

Disclosure Date: February 05, 2020 (last updated February 21, 2025)
In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
Attacker Value
Unknown

CVE-2020-7940

Disclosure Date: January 23, 2020 (last updated February 21, 2025)
Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to set weak passwords, leading to easier cracking.