Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
weak vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0244
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Citrix Metaframe 1.0
Citrix Metaframe
Citrix Winframe 3.5 1.8 For Windows Nt
1 EDB exploit
NA
CVE-2001-0983
UltraEdit uses weak encryption to record FTP passwords in the uedit32.ini file, which allows local users who can read the file to decrypt the passwords and gain privileges.
Ultraedit Ultraedit-32
1 EDB exploit
7.5
CVSSv3
CVE-2020-28924
An issue exists in Rclone prior to 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started...
Rclone Rclone
Fedoraproject Fedora 33
9.8
CVSSv3
CVE-2019-17393
The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and dis...
Tomedo Server 1.7.3
NA
CVE-2004-1861
Invision NetSupport School Pro uses a weak encryption algorithm to encrypt passwords, which allows local users to obtain passwords.
Netsupport Netsupport School 7.5
Netsupport Netsupport School 7.0
Netsupport Netsupport School 7.0 1
1 EDB exploit
NA
CVE-2005-0357
EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 up to and including 7.2 rely on AUTH_UNIX authentication, which relies on user ID for authentication and allows remote malicious users to bypass authentication and gain privileges by spoofin...
Emc Legato Networker 4.2.2
Sun Storedge Enterprise Backup Software 7.0
Sun Storedge Enterprise Backup Software 7.1
Emc Legato Networker 7.13
Emc Legato Networker 7.2
Sun Solstice Backup 6.0
Sun Solstice Backup 6.1
Emc Legato Networker 6.0
Emc Legato Networker 6.1
Sun Storedge Enterprise Backup Software 7.2
NA
CVE-2001-0839
ibillpm.pl in iBill password management system generates weak passwords based on a client's MASTER_ACCOUNT, which allows remote malicious users to modify account information in the .htpasswd file via brute force password guessing.
Ibill Internet Billing Company Processing Plus
1 EDB exploit
NA
CVE-2000-0449
Omnis Studio 2.4 uses weak encryption (trivial encoding) for encrypting database fields.
Omnis Studio 2.4
1 EDB exploit
NA
CVE-2001-1142
ArGoSoft FTP Server 1.2.2.2 uses weak encryption for user passwords, which allows an attacker with access to the password file to gain privileges.
Argosoft Ftp Server 1.2.2.2
1 EDB exploit
NA
CVE-2001-1003
Respondus 1.1.2 for WebCT uses weak encryption to remember usernames and passwords, which allows local users who can read the WEBCT.SVR file to decrypt the passwords and gain additional privileges.
Webct Respondus 1.1.2
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »