Vulnerabilities (CVE)

Filtered by CWE-916
Total 88 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-28873 1 Fluxbb 1 Fluxbb 2023-11-07 7.8 HIGH 7.5 HIGH
Fluxbb 1.5.11 is affected by a denial of service (DoS) vulnerability by sending an extremely long password via the user login form. When a long password is sent, the password hashing process will result in CPU and memory exhaustion on the server.
CVE-2020-14389 1 Redhat 1 Keycloak 2023-11-07 5.5 MEDIUM 8.1 HIGH
It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have.
CVE-2020-12069 1 Pilz 1 Pmc 2023-11-07 N/A 9.8 CRITICAL
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
CVE-2019-19735 1 Mfscripts 1 Yetishare 2023-11-07 6.4 MEDIUM 9.1 CRITICAL
class.userpeer.php in MFScripts YetiShare 3.5.2 through 4.5.3 uses an insecure method of creating password reset hashes (based only on microtime), which allows an attacker to guess the hash and set the password within a few hours by bruteforcing.
CVE-2019-0030 1 Juniper 3 Advanced Threat Prevention Firmware, Atp400, Atp700 2023-11-07 4.0 MEDIUM 7.2 HIGH
Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
CVE-2017-3962 1 Mcafee 1 Network Security Manager 2023-11-07 5.0 MEDIUM 9.8 CRITICAL
Password recovery exploitation vulnerability in the non-certificate-based authentication mechanism in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows attackers to crack user passwords via unsalted hashes.
CVE-2022-40295 1 Phppointofsale 1 Php Point Of Sale 2023-10-25 N/A 4.9 MEDIUM
The application was vulnerable to an authenticated information disclosure, allowing administrators to view unsalted user passwords, which could lead to the compromise of plaintext passwords via offline attacks.
CVE-2021-36767 1 Digi 37 6350-sr, 6350-sr Firmware, Cm and 34 more 2023-09-25 7.5 HIGH 9.8 CRITICAL
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
CVE-2023-41646 1 Perrymitchell 1 Buttercup 2023-09-12 N/A 5.3 MEDIUM
Buttercup v2.20.3 allows attackers to obtain the hash of the master password for the password manager via accessing the file /vaults.json/
CVE-2023-31412 1 Sick 6 Lms500, Lms500 Firmware, Lms511 and 3 more 2023-08-30 N/A 7.5 HIGH
The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.
CVE-2022-37164 1 Ontrack Project 1 Ontrack 2023-08-08 N/A 9.8 CRITICAL
Inoda OnTrack v3.4 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes.
CVE-2022-37163 1 Ihatetobudget Project 1 Ihatetobudget 2023-08-08 N/A 9.8 CRITICAL
Bminusl IHateToBudget v1.5.7 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes.
CVE-2022-40258 1 Ami 2 Megarac Spx-12, Megarac Spx-13 2023-07-31 N/A 5.3 MEDIUM
AMI Megarac Weak password hashes for Redfish & API
CVE-2021-43989 1 Myscada 1 Mypro 2023-07-21 5.0 MEDIUM 7.5 HIGH
mySCADA myPRO Versions 8.20.0 and prior stores passwords using MD5, which may allow an attacker to crack the previously retrieved password hashes.
CVE-2021-39182 1 Enrocrypt Project 1 Enrocrypt 2023-07-17 5.0 MEDIUM 7.5 HIGH
EnroCrypt is a Python module for encryption and hashing. Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. The vulnerability is patched in v1.1.4 of the product. As a workaround, users can remove the `MD5` hashing function from the file `hashing.py`.
CVE-2023-34433 1 Piigab 2 M-bus 900s, M-bus 900s Firmware 2023-07-14 N/A 9.8 CRITICAL
PiiGAB M-Bus stores passwords using a weak hash algorithm.
CVE-2021-38314 1 Redux 1 Gutenberg Template Library \& Redux Framework 2023-07-10 5.0 MEDIUM 5.3 MEDIUM
The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.
CVE-2023-33243 1 Starface 1 Starface 2023-07-03 N/A 8.1 HIGH
RedTeam Pentesting discovered that the web interface of STARFACE as well as its REST API allows authentication using the SHA512 hash of the password instead of the cleartext password. While storing password hashes instead of cleartext passwords in an application's database generally has become best practice to protect users' passwords in case of a database compromise, this is rendered ineffective when allowing to authenticate using the password hash.
CVE-2023-27580 1 Codeigniter 1 Shield 2023-03-23 N/A 5.9 MEDIUM
CodeIgniter Shield provides authentication and authorization for the CodeIgniter 4 PHP framework. An improper implementation was found in the password storage process. All hashed passwords stored in Shield v1.0.0-beta.3 or earlier are easier to crack than expected due to the vulnerability. Therefore, they should be removed as soon as possible. If an attacker gets (1) the user's hashed password by Shield, and (2) the hashed password (SHA-384 hash without salt) from somewhere, the attacker may easily crack the user's password. Upgrade to Shield v1.0.0-beta.4 or later to fix this issue. After upgrading, all users’ hashed passwords should be updated (saved to the database). There are no known workarounds.
CVE-2022-47732 1 Yeastar 4 N412, N412 Firmware, N824 and 1 more 2023-02-06 N/A 7.5 HIGH
In Yeastar N412 and N824 Configuration Panel 42.x and 45.x, an unauthenticated attacker can create backup file and download it, revealing admin hash, allowing, once cracked, to login inside the Configuration Panel, otherwise, replacing the hash in the archive and restoring it on the device which will change admin password granting access to the device.