Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
weak vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0244
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Citrix Metaframe 1.0
Citrix Metaframe
Citrix Winframe 3.5 1.8 For Windows Nt
1 EDB exploit
NA
CVE-2002-2417
acFTP 1.4 does not properly handle when an invalid password is provided by the user during authentication, which allows remote malicious users to hide or misrepresent certain activity from log files and possibly gain privileges.
Acftp Acftp 1.4
1 EDB exploit
NA
CVE-2001-0839
ibillpm.pl in iBill password management system generates weak passwords based on a client's MASTER_ACCOUNT, which allows remote malicious users to modify account information in the .htpasswd file via brute force password guessing.
Ibill Internet Billing Company Processing Plus
1 EDB exploit
NA
CVE-2004-1861
Invision NetSupport School Pro uses a weak encryption algorithm to encrypt passwords, which allows local users to obtain passwords.
Netsupport Netsupport School 7.0
Netsupport Netsupport School 7.5
Netsupport Netsupport School 7.0 1
1 EDB exploit
NA
CVE-2007-0528
The admin web console implemented by the Centrality Communications (aka Aredfox) PA168 chipset and firmware 1.54 and previous versions, as provided by various IP phones, does not require passwords or authentication tokens when using HTTP, which allows remote malicious users to co...
Centrality Communications Pa168 Chipset
1 EDB exploit
NA
CVE-2002-0486
Intellisol Xpede 4.1 uses weak encryption to store authentication information in cookies, which could allow local users with access to the cookies to gain privileges.
Workforceroi Xpede 4.1
Workforceroi Xpede 7.0
1 EDB exploit
4.7
CVSSv3
CVE-2016-1919
Samsung KNOX 1.0 uses a weak eCryptFS Key generation algorithm, which makes it easier for local users to obtain sensitive information by leveraging knowledge of the TIMA key and a brute-force attack.
Samsung Knox
NA
CVE-2004-2134
Oracle toplink mapping workBench uses a weak encryption algorithm for passwords, which allows local users to decrypt the passwords.
Oracle Application Server 9.0.2.1
Oracle Application Server 9.0.2.0.0
Oracle Application Server 9.0.2.3
Oracle Application Server 9.0.2.0.1
Oracle Application Server 9.0.2.2
Oracle Application Server 9.0.2
Oracle Application Server 9.0.3
1 EDB exploit
7.5
CVSSv3
CVE-2004-2172
EarlyImpact ProductCart uses a weak encryption scheme to encrypt passwords, which allows remote malicious users to obtain the password via a chosen plaintext attack.
Netsourcecommerce Productcart
1 EDB exploit
NA
CVE-2005-0357
EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 up to and including 7.2 rely on AUTH_UNIX authentication, which relies on user ID for authentication and allows remote malicious users to bypass authentication and gain privileges by spoofin...
Emc Legato Networker 6.0
Emc Legato Networker 7.2
Emc Legato Networker 4.2.2
Sun Storedge Enterprise Backup Software 7.0
Sun Storedge Enterprise Backup Software 7.1
Sun Storedge Enterprise Backup Software 7.2
Sun Solstice Backup 6.1
Emc Legato Networker 7.13
Sun Solstice Backup 6.0
Emc Legato Networker 6.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »