Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
weak vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2017-13094
The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of the encryption key and insertion of hardware trojans in any IP. The methods are flawed a...
- - -
7.8
CVSSv3
CVE-2017-13095
The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of a license-deny response to a license grant. The methods are flawed and, in the most egre...
- - -
7.8
CVSSv3
CVE-2017-13096
The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of Rights Block to remove or relax access control. The methods are flawed and, in the most ...
- - -
NA
CVE-2003-1480
MySQL 3.20 up to and including 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for malicious users to decrypt the password via brute force methods.
Mysql Mysql 4.1.0
Oracle Mysql 3.20
Oracle Mysql 3.20.32a
Oracle Mysql 3.21
Oracle Mysql 3.22
Oracle Mysql 3.22.26
Oracle Mysql 3.22.27
Oracle Mysql 3.22.28
Oracle Mysql 3.22.29
Oracle Mysql 3.22.30
Oracle Mysql 3.22.32
Oracle Mysql 3.23.2
Oracle Mysql 3.23.3
Oracle Mysql 3.23.4
Oracle Mysql 3.23.5
Oracle Mysql 3.23.8
Oracle Mysql 3.23.9
Oracle Mysql 3.23.10
Oracle Mysql 3.23.22
Oracle Mysql 3.23.23
Oracle Mysql 3.23.24
Oracle Mysql 3.23.25
1 EDB exploit
NA
CVE-1999-1543
MacOS uses weak encryption for passwords that are stored in the Users & Groups Data File.
Apple Macos 7.5.3
Apple Macos 7.6
Apple Macos 7.6.1
Apple Macos 8.0
Apple Macos 8.1
Apple Macos 8.5
Apple Macos 8.6
1 EDB exploit
7.5
CVSSv3
CVE-2005-2946
The default configuration on OpenSSL prior to 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote malicious users to forge certificates with a valid certificate authority signature.
Openssl Openssl
Canonical Ubuntu Linux 4.10
Canonical Ubuntu Linux 5.04
NA
CVE-2005-2030
Ultimate PHP Board (UPB) 1.9.6 GOLD uses weak encryption for passwords in the users.dat file, which allows malicious users to easily decrypt the passwords and gain privileges, possibly after exploiting CVE-2005-2005 to obtain users.dat.
Ultimate Php Board Ultimate Php Board 1.9.6
Ultimate Php Board Ultimate Php Board 1.8
Ultimate Php Board Ultimate Php Board 1.8.2
Ultimate Php Board Ultimate Php Board 1.9
1 EDB exploit
NA
CVE-1999-0944
IBM WebSphere ikeyman tool uses weak encryption to store a password for a key database that is used for SSL connections.
1 EDB exploit
NA
CVE-2015-2804
The management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, and 6855 with firmware prior to 6.6.4.309.R01 and 6.6.5.x prior to 6.6.5.80.R02 generates weak session identifiers, which allows remote malicious users to hijack arbitrary sessions via a bru...
Alcatel-lucent Omniswitch Firmware
7.8
CVSSv3
CVE-2023-27010
Wondershare Dr.Fone v12.9.6 exists to contain weak permissions for the service WsDrvInst. This vulnerability allows malicious users to escalate privileges via modifying or overwriting the executable.
Wondershare Dr.fone 12.9.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »