Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
digit vulnerabilities and exploits
(subscribe to this query)
8.1
CVSSv3
CVE-2023-49949
Passwork prior to 6.2.0 allows remote authenticated users to bypass 2FA by sending all one million of the possible 6-digit codes.
Passwork Passwork
NA
CVE-2004-0332
Extremail 1.5.9 does not check passwords correctly when they are all digits or begin with a digit, which allows remote malicious users to gain privileges.
Extremail Extremail 1.0
Extremail Extremail 1.0.1
Extremail Extremail 1.1.4
Extremail Extremail 1.1.5
Extremail Extremail 1.5.8
Extremail Extremail 1.5.9
Extremail Extremail 1.1.1
Extremail Extremail 1.1.10
Extremail Extremail 1.1.8
Extremail Extremail 1.1.9
Extremail Extremail 1.0.2
Extremail Extremail 1.0.3
Extremail Extremail 1.1
Extremail Extremail 1.1.6
Extremail Extremail 1.1.7
Extremail Extremail 1.1.2
Extremail Extremail 1.1.3
Extremail Extremail 1.5
Extremail Extremail 1.5.5
7.5
CVSSv3
CVE-2017-9818
The National Payments Corporation of India BHIM application 1.3 for Android relies on a four-digit passcode, which makes it easier for malicious users to obtain access.
Npci Bharat Interface For Money \\(bhim\\) 1.3
9.1
CVSSv3
CVE-2021-4238
Randomly-generated alphanumeric strings contain significantly less entropy than expected. The RandomAlphaNumeric and CryptoRandomAlphaNumeric functions always return strings containing at least one digit from 0 to 9. This significantly reduces the amount of entropy in short strin...
Goutils Project Goutils
1 Github repository
NA
CVE-2015-4652
epan/dissectors/packet-gsm_a_dtap.c in the GSM DTAP dissector in Wireshark 1.12.x prior to 1.12.6 does not properly validate digit characters, which allows remote malicious users to cause a denial of service (application crash) via a crafted packet, related to the de_emerg_num_li...
Debian Debian Linux 8.0
Wireshark Wireshark 1.12.4
Wireshark Wireshark 1.12.5
Wireshark Wireshark 1.12.0
Wireshark Wireshark 1.12.2
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.12.3
NA
CVE-2011-0951
The web-based management interface in Cisco Secure Access Control System (ACS) 5.1 prior to 5.1.0.44.6 and 5.2 prior to 5.2.0.26.3 allows remote malicious users to change arbitrary user passwords via unspecified vectors, aka Bug ID CSCtl77440.
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.2.0.26.2
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.4
Cisco Secure Access Control System 5.1
Cisco Secure Access Control System 5.1.0.44
Cisco Secure Access Control System 5.2.0.26
Cisco Secure Access Control System 5.2.0.26.1
Cisco Secure Access Control System 5.1.0.44.5
Cisco Secure Access Control System 5.2
NA
CVE-2014-0648
The RMI interface in Cisco Secure Access Control System (ACS) 5.x prior to 5.5 does not properly enforce authentication and authorization requirements, which allows remote malicious users to obtain administrative access via a request to this interface, aka Bug ID CSCud75187.
Cisco Secure Access Control System 5.4.0.46.5
Cisco Secure Access Control System
Cisco Secure Access Control System 5.3.0.40.8
Cisco Secure Access Control System 5.3.0.40.9
Cisco Secure Access Control System 5.1.0.44.5
Cisco Secure Access Control System 5.2
Cisco Secure Access Control System 5.4.0.46.1
Cisco Secure Access Control System 5.4.0.46.2
Cisco Secure Access Control System 5.3.0.40.4
Cisco Secure Access Control System 5.3.0.40.5
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.2.0.26.2
Cisco Secure Access Control System 5.4.0.46.3
Cisco Secure Access Control System 5.4.0.46.4
Cisco Secure Access Control System 5.3.0.40.6
Cisco Secure Access Control System 5.3.0.40.7
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.4
Cisco Secure Access Control System 5.3.0.40.1
Cisco Secure Access Control System 5.3.0.40.2
Cisco Secure Access Control System 5.3.0.40.3
NA
CVE-2014-0649
The RMI interface in Cisco Secure Access Control System (ACS) 5.x prior to 5.5 does not properly enforce authorization requirements, which allows remote authenticated users to obtain superadmin access via a request to this interface, aka Bug ID CSCud75180.
Cisco Secure Access Control System 5.4.0.46.3
Cisco Secure Access Control System 5.4.0.46.4
Cisco Secure Access Control System 5.4.0.46.5
Cisco Secure Access Control System 5.3.0.40.6
Cisco Secure Access Control System 5.3.0.40.2
Cisco Secure Access Control System 5.3.0.40.3
Cisco Secure Access Control System 5.1
Cisco Secure Access Control System 5.1.0.44
Cisco Secure Access Control System 5.2.0.26
Cisco Secure Access Control System 5.2.0.26.1
Cisco Secure Access Control System 5.3.0.40.7
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.4
Cisco Secure Access Control System 5.4.0.46.1
Cisco Secure Access Control System 5.4.0.46.2
Cisco Secure Access Control System 5.3.0.40.4
Cisco Secure Access Control System 5.3.0.40.5
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.2.0.26.2
Cisco Secure Access Control System
Cisco Secure Access Control System 5.3.0.40.1
1 Article
7.5
CVSSv3
CVE-2020-13860
An issue exists on Mofi Network MOFI4500-4GXeLTE 4.0.8-std devices. The one-time password algorithm for the undocumented system account mofidev generates a predictable six-digit password.
Mofinetwork Mofi4500-4gxelte Firmware 4.0.8-std
8.1
CVSSv3
CVE-2018-7195
Enhancesoft osTicket prior to 1.10.2 allows remote malicious users to reset arbitrary passwords (when an associated e-mail address is known) by leveraging guest access and guessing a 6-digit number.
Osticket Osticket
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »