Vulnerabilities (CVE)

Filtered by CWE-916
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-5846 1 Franklinfueling 2 Ts-550 Evo, Ts-550 Evo Firmware 2023-11-09 N/A 9.8 CRITICAL
Franklin Fueling System TS-550 versions prior to 1.9.23.8960 are vulnerable to attackers decoding admin credentials, resulting in unauthenticated access to the device.
CVE-2022-37163 1 Ihatetobudget Project 1 Ihatetobudget 2023-08-08 N/A 9.8 CRITICAL
Bminusl IHateToBudget v1.5.7 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes.
CVE-2022-37164 1 Ontrack Project 1 Ontrack 2023-08-08 N/A 9.8 CRITICAL
Inoda OnTrack v3.4 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes.
CVE-2021-36767 1 Digi 45 6350-sr, 6350-sr Firmware, Cm and 42 more 2022-04-29 7.5 HIGH 9.8 CRITICAL
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
CVE-2019-20062 1 Mfscripts 1 Yetishare 2021-07-21 5.0 MEDIUM 9.8 CRITICAL
MFScripts YetiShare v3.5.2 through v4.5.4 might allow an attacker to reset a password by using a leaked hash (the hash never expires until used).
CVE-2020-14516 1 Rockwellautomation 1 Factorytalk Services Platform 2021-03-26 7.5 HIGH 10.0 CRITICAL
In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly.
CVE-2019-6563 1 Moxa 8 Eds-405a, Eds-405a Firmware, Eds-408a and 5 more 2020-10-05 10.0 HIGH 9.8 CRITICAL
Moxa IKS and EDS generate a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator's password, which could lead to a full compromise of the device.
CVE-2019-17216 1 Vzug 2 Combi-stream Mslq, Combi-stream Mslq Firmware 2020-08-24 7.5 HIGH 9.8 CRITICAL
An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. Password authentication uses MD5 to hash passwords. Cracking is possible with minimal effort.
CVE-2019-19735 1 Mfscripts 1 Yetishare 2020-01-08 6.4 MEDIUM 9.1 CRITICAL
class.userpeer.php in MFScripts YetiShare 3.5.2 through 4.5.3 uses an insecure method of creating password reset hashes (based only on microtime), which allows an attacker to guess the hash and set the password within a few hours by bruteforcing.
CVE-2018-10618 1 Davolink 2 Dvw-3200n, Dvw-3200n Firmware 2019-10-09 5.0 MEDIUM 9.8 CRITICAL
Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device.
CVE-2017-3962 1 Mcafee 1 Network Security Manager 2019-10-09 5.0 MEDIUM 9.8 CRITICAL
Password recovery exploitation vulnerability in the non-certificate-based authentication mechanism in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows attackers to crack user passwords via unsalted hashes.
CVE-2018-15681 1 Btiteam 1 Xbtit 2019-10-03 5.0 MEDIUM 9.8 CRITICAL
An issue was discovered in BTITeam XBTIT 2.5.4. When a user logs in, their password hash is rehashed using a predictable salt and stored in the "pass" cookie, which is not flagged as HTTPOnly. Due to the weak and predictable salt that is in place, an attacker who successfully steals this cookie can efficiently brute-force it to retrieve the user's cleartext password.
CVE-2018-15680 1 Btiteam 1 Xbtit 2019-10-03 5.0 MEDIUM 9.8 CRITICAL
An issue was discovered in BTITeam XBTIT 2.5.4. The hashed passwords stored in the xbtit_users table are stored as unsalted MD5 hashes, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack.