Vulnerabilities (CVE)

Filtered by CWE-521
Total 206 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-3376 1 Ikus-soft 1 Rdiffweb 2024-11-21 N/A 5.3 MEDIUM
Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.5.0a4.
CVE-2022-3326 1 Ikus-soft 1 Rdiffweb 2024-11-21 N/A 4.3 MEDIUM
Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.9.
CVE-2022-3268 1 Ikus-soft 1 Minarca 2024-11-21 N/A 9.8 CRITICAL
Weak Password Requirements in GitHub repository ikus060/minarca prior to 4.2.2.
CVE-2022-3179 1 Ikus-soft 1 Rdiffweb 2024-11-21 N/A 8.8 HIGH
Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.2.
CVE-2022-37158 1 Iocoder 1 Ruoyi-vue-pro 2024-11-21 N/A 9.8 CRITICAL
RuoYi v3.8.3 has a Weak password vulnerability in the management system.
CVE-2022-36301 1 Bosch 1 Bf-os 2024-11-21 N/A 9.8 CRITICAL
BF-OS version 3.x up to and including 3.83 do not enforce strong passwords which may allow a remote attacker to brute-force the device password.
CVE-2022-35280 2 Ibm, Microsoft 2 Robotic Process Automation For Cloud Pak, Windows 2024-11-21 N/A 9.8 CRITICAL
IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 230634.
CVE-2022-35143 1 Raneto Project 1 Raneto 2024-11-21 N/A 9.8 CRITICAL
Renato v0.17.0 employs weak password complexity requirements, allowing attackers to crack user passwords via brute-force attacks.
CVE-2022-34772 1 Tabit 1 Tabit 2024-11-21 N/A 4.3 MEDIUM
Tabit - password enumeration. Description: Tabit - password enumeration. The passwords for the Tabit system is a 4 digit OTP. One can resend OTP and try logging in indefinitely. Once again, this is an example of OWASP: API4 - Rate limiting.
CVE-2022-34615 1 Mealie 1 Mealie 2024-11-21 N/A 9.8 CRITICAL
Mealie 1.0.0beta3 employs weak password requirements which allows attackers to potentially gain unauthorized access to the application via brute-force attacks.
CVE-2022-34333 1 Ibm 1 Sterling Order Management 2024-11-21 N/A 5.9 MEDIUM
IBM Sterling Order Management 10.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 229698.
CVE-2022-32513 1 Schneider-electric 12 5500ac2, 5500ac2 Firmware, 5500nac and 9 more 2024-11-21 N/A 9.8 CRITICAL
A CWE-521: Weak Password Requirements vulnerability exists that could allow an attacker to gain control of the device when the attacker brute forces the password. Affected Products: C-Bus Network Automation Controller - LSS5500NAC (Versions prior to V1.10.0), Wiser for C-Bus Automation Controller - LSS5500SHAC (Versions prior to V1.10.0), Clipsal C-Bus Network Automation Controller - 5500NAC (Versions prior to V1.10.0), Clipsal Wiser for C-Bus Automation Controller - 5500SHAC (Versions prior to V1.10.0), SpaceLogic C-Bus Network Automation Controller - 5500NAC2 (Versions prior to V1.10.0), SpaceLogic C-Bus Application Controller - 5500AC2 (Versions prior to V1.10.0)
CVE-2022-31211 1 Infiray 2 Iray-a8z3, Iray-a8z3 Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
An issue was discovered in Infiray IRAY-A8Z3 1.0.957. There is a blank root password for TELNET by default.
CVE-2022-30325 1 Trendnet 2 Tew-831dr, Tew-831dr Firmware 2024-11-21 3.3 LOW 8.8 HIGH
An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The default pre-shared key for the Wi-Fi networks is the same for every router except for the last four digits. The device default pre-shared key for both 2.4 GHz and 5 GHz networks can be guessed or brute-forced by an attacker within range of the Wi-Fi network.
CVE-2022-2927 1 Notrinos 1 Notrinoserp 2024-11-21 N/A 9.8 CRITICAL
Weak Password Requirements in GitHub repository notrinos/notrinoserp prior to 0.7.
CVE-2022-2098 1 Kromit 1 Titra 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
Weak Password Requirements in GitHub repository kromitgmbh/titra prior to 0.78.1.
CVE-2022-29729 1 Verizon 2 4g Lte Network Extender, 4g Lte Network Extender Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
Verizon 4G LTE Network Extender GA4.38 - V0.4.038.2131 utilizes a weak default admin password generation algorithm which generates passwords that are accessible to unauthenticated attackers via the webUI login page.
CVE-2022-29700 1 Zammad 1 Zammad 2024-11-21 5.0 MEDIUM 7.5 HIGH
A lack of password length restriction in Zammad v5.1.0 allows for the creation of extremely long passwords which can cause a Denial of Service (DoS) during password verification.
CVE-2022-29098 1 Dell 1 Powerscale Onefs 2024-11-21 5.0 MEDIUM 8.1 HIGH
Dell PowerScale OneFS versions 8.2.0.x through 9.3.0.x, contain a weak password requirement vulnerability. An administrator may create an account with no password. A remote attacker may potentially exploit this leading to a user account compromise.
CVE-2022-28377 1 Verizon 4 Lvskihp Indoorunit, Lvskihp Indoorunit Firmware, Lvskihp Outdoorunit and 1 more 2024-11-21 N/A 7.5 HIGH
On Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 and OutDoorUnit (ODU) 3.33.101.0 devices, the CRTC and ODU RPC endpoints rely on a static account username/password for access control. This password can be generated via a binary included in the firmware, after ascertaining the MAC address of the IDU's base Ethernet interface, and adding the string DEVICE_MANUFACTURER='Wistron_NeWeb_Corp.' to /etc/device_info to replicate the host environment. This occurs in /etc/init.d/wnc_factoryssidkeypwd (IDU).