Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
weak vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2000-0244
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Citrix Metaframe 1.0
Citrix Metaframe
Citrix Winframe 3.5 1.8 For Windows Nt
1 EDB exploit
1000
VMScore
CVE-2002-2417
acFTP 1.4 does not properly handle when an invalid password is provided by the user during authentication, which allows remote malicious users to hide or misrepresent certain activity from log files and possibly gain privileges.
Acftp Acftp 1.4
1 EDB exploit
755
VMScore
CVE-2001-0839
ibillpm.pl in iBill password management system generates weak passwords based on a client's MASTER_ACCOUNT, which allows remote malicious users to modify account information in the .htpasswd file via brute force password guessing.
Ibill Internet Billing Company Processing Plus
1 EDB exploit
465
VMScore
CVE-2004-1861
Invision NetSupport School Pro uses a weak encryption algorithm to encrypt passwords, which allows local users to obtain passwords.
Netsupport Netsupport School 7.0
Netsupport Netsupport School 7.5
Netsupport Netsupport School 7.0 1
1 EDB exploit
905
VMScore
CVE-2007-0528
The admin web console implemented by the Centrality Communications (aka Aredfox) PA168 chipset and firmware 1.54 and previous versions, as provided by various IP phones, does not require passwords or authentication tokens when using HTTP, which allows remote malicious users to co...
Centrality Communications Pa168 Chipset
1 EDB exploit
725
VMScore
CVE-2002-0486
Intellisol Xpede 4.1 uses weak encryption to store authentication information in cookies, which could allow local users with access to the cookies to gain privileges.
Workforceroi Xpede 4.1
Workforceroi Xpede 7.0
1 EDB exploit
169
VMScore
CVE-2016-1919
Samsung KNOX 1.0 uses a weak eCryptFS Key generation algorithm, which makes it easier for local users to obtain sensitive information by leveraging knowledge of the TIMA key and a brute-force attack.
Samsung Knox
465
VMScore
CVE-2004-2134
Oracle toplink mapping workBench uses a weak encryption algorithm for passwords, which allows local users to decrypt the passwords.
Oracle Application Server 9.0.2.1
Oracle Application Server 9.0.2.0.0
Oracle Application Server 9.0.2.3
Oracle Application Server 9.0.2.0.1
Oracle Application Server 9.0.2.2
Oracle Application Server 9.0.2
Oracle Application Server 9.0.3
1 EDB exploit
505
VMScore
CVE-2004-2172
EarlyImpact ProductCart uses a weak encryption scheme to encrypt passwords, which allows remote malicious users to obtain the password via a chosen plaintext attack.
Netsourcecommerce Productcart
1 EDB exploit
668
VMScore
CVE-2005-0357
EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 up to and including 7.2 rely on AUTH_UNIX authentication, which relies on user ID for authentication and allows remote malicious users to bypass authentication and gain privileges by spoofin...
Emc Legato Networker 6.0
Emc Legato Networker 7.2
Emc Legato Networker 4.2.2
Sun Storedge Enterprise Backup Software 7.0
Sun Storedge Enterprise Backup Software 7.1
Sun Storedge Enterprise Backup Software 7.2
Sun Solstice Backup 6.1
Emc Legato Networker 7.13
Sun Solstice Backup 6.0
Emc Legato Networker 6.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »