Search Results (108 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2018-13811 1 Siemens 1 Simatic Step 7 \(tia Portal\) 2024-11-21 N/A
A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions < V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known.
CVE-2018-10618 1 Davolink 2 Dvw-3200n, Dvw-3200n Firmware 2024-11-21 N/A
Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device.
CVE-2017-3962 1 Mcafee 1 Network Security Manager 2024-11-21 N/A
Password recovery exploitation vulnerability in the non-certificate-based authentication mechanism in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows attackers to crack user passwords via unsalted hashes.
CVE-2017-18917 1 Mattermost 1 Mattermost Server 2024-11-21 7.5 High
An issue was discovered in Mattermost Server before 3.8.2, 3.7.5, and 3.6.7. Weak hashing was used for e-mail invitations, OAuth, and e-mail verification tokens.
CVE-2014-2560 1 Phoner 1 Phonerlite 2024-11-21 7.5 High
The PhonerLite phone before 2.15 provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.
CVE-2014-0083 2 Debian, Net-ldap Project 2 Debian Linux, Net-ldap 2024-11-21 5.5 Medium
The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA passwords.
CVE-2010-2450 2 Debian, Shibboleth 2 Debian Linux, Service Provider 2024-11-21 7.5 High
The keygen.sh script in Shibboleth SP 2.0 (located in /usr/local/etc/shibboleth by default) uses OpenSSL to create a DES private key which is placed in sp-key.pm. It relies on the root umask (default 22) instead of chmoding the resulting file itself, so the generated private key is world readable by default.
CVE-2009-5139 1 Google 1 Gizmo5 2024-11-21 7.5 High
The SIP implementation on the Gizmo5 software phone provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.