Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
digit vulnerabilities and exploits
(subscribe to this query)
8.1
CVSSv3
CVE-2023-49949
Passwork prior to 6.2.0 allows remote authenticated users to bypass 2FA by sending all one million of the possible 6-digit codes.
Passwork Passwork
NA
CVE-2004-0332
Extremail 1.5.9 does not check passwords correctly when they are all digits or begin with a digit, which allows remote malicious users to gain privileges.
Extremail Extremail 1.0
Extremail Extremail 1.0.1
Extremail Extremail 1.1.4
Extremail Extremail 1.1.5
Extremail Extremail 1.5.8
Extremail Extremail 1.5.9
Extremail Extremail 1.1.1
Extremail Extremail 1.1.10
Extremail Extremail 1.1.8
Extremail Extremail 1.1.9
Extremail Extremail 1.0.2
Extremail Extremail 1.0.3
Extremail Extremail 1.1
Extremail Extremail 1.1.6
Extremail Extremail 1.1.7
Extremail Extremail 1.1.2
Extremail Extremail 1.1.3
Extremail Extremail 1.5
Extremail Extremail 1.5.5
7.5
CVSSv3
CVE-2017-9818
The National Payments Corporation of India BHIM application 1.3 for Android relies on a four-digit passcode, which makes it easier for malicious users to obtain access.
Npci Bharat Interface For Money \\(bhim\\) 1.3
NA
CVE-2015-4652
epan/dissectors/packet-gsm_a_dtap.c in the GSM DTAP dissector in Wireshark 1.12.x prior to 1.12.6 does not properly validate digit characters, which allows remote malicious users to cause a denial of service (application crash) via a crafted packet, related to the de_emerg_num_li...
Debian Debian Linux 8.0
Wireshark Wireshark 1.12.4
Wireshark Wireshark 1.12.5
Wireshark Wireshark 1.12.0
Wireshark Wireshark 1.12.2
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.12.3
9.1
CVSSv3
CVE-2021-4238
Randomly-generated alphanumeric strings contain significantly less entropy than expected. The RandomAlphaNumeric and CryptoRandomAlphaNumeric functions always return strings containing at least one digit from 0 to 9. This significantly reduces the amount of entropy in short strin...
Goutils Project Goutils
1 Github repository
7.5
CVSSv3
CVE-2020-13860
An issue exists on Mofi Network MOFI4500-4GXeLTE 4.0.8-std devices. The one-time password algorithm for the undocumented system account mofidev generates a predictable six-digit password.
Mofinetwork Mofi4500-4gxelte Firmware 4.0.8-std
8.1
CVSSv3
CVE-2018-7195
Enhancesoft osTicket prior to 1.10.2 allows remote malicious users to reset arbitrary passwords (when an associated e-mail address is known) by leveraging guest access and guessing a 6-digit number.
Osticket Osticket
NA
CVE-2011-0951
The web-based management interface in Cisco Secure Access Control System (ACS) 5.1 prior to 5.1.0.44.6 and 5.2 prior to 5.2.0.26.3 allows remote malicious users to change arbitrary user passwords via unspecified vectors, aka Bug ID CSCtl77440.
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.2.0.26.2
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.4
Cisco Secure Access Control System 5.1
Cisco Secure Access Control System 5.1.0.44
Cisco Secure Access Control System 5.2.0.26
Cisco Secure Access Control System 5.2.0.26.1
Cisco Secure Access Control System 5.1.0.44.5
Cisco Secure Access Control System 5.2
NA
CVE-2014-0649
The RMI interface in Cisco Secure Access Control System (ACS) 5.x prior to 5.5 does not properly enforce authorization requirements, which allows remote authenticated users to obtain superadmin access via a request to this interface, aka Bug ID CSCud75180.
Cisco Secure Access Control System 5.4.0.46.3
Cisco Secure Access Control System 5.4.0.46.4
Cisco Secure Access Control System 5.4.0.46.5
Cisco Secure Access Control System 5.3.0.40.6
Cisco Secure Access Control System 5.3.0.40.2
Cisco Secure Access Control System 5.3.0.40.3
Cisco Secure Access Control System 5.1
Cisco Secure Access Control System 5.1.0.44
Cisco Secure Access Control System 5.2.0.26
Cisco Secure Access Control System 5.2.0.26.1
Cisco Secure Access Control System 5.3.0.40.7
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.4
Cisco Secure Access Control System 5.4.0.46.1
Cisco Secure Access Control System 5.4.0.46.2
Cisco Secure Access Control System 5.3.0.40.4
Cisco Secure Access Control System 5.3.0.40.5
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.2.0.26.2
Cisco Secure Access Control System
Cisco Secure Access Control System 5.3.0.40.1
1 Article
NA
CVE-2014-0648
The RMI interface in Cisco Secure Access Control System (ACS) 5.x prior to 5.5 does not properly enforce authentication and authorization requirements, which allows remote malicious users to obtain administrative access via a request to this interface, aka Bug ID CSCud75187.
Cisco Secure Access Control System 5.4.0.46.5
Cisco Secure Access Control System
Cisco Secure Access Control System 5.3.0.40.8
Cisco Secure Access Control System 5.3.0.40.9
Cisco Secure Access Control System 5.1.0.44.5
Cisco Secure Access Control System 5.2
Cisco Secure Access Control System 5.4.0.46.1
Cisco Secure Access Control System 5.4.0.46.2
Cisco Secure Access Control System 5.3.0.40.4
Cisco Secure Access Control System 5.3.0.40.5
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.2.0.26.2
Cisco Secure Access Control System 5.4.0.46.3
Cisco Secure Access Control System 5.4.0.46.4
Cisco Secure Access Control System 5.3.0.40.6
Cisco Secure Access Control System 5.3.0.40.7
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.4
Cisco Secure Access Control System 5.3.0.40.1
Cisco Secure Access Control System 5.3.0.40.2
Cisco Secure Access Control System 5.3.0.40.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »