CVE-2024-41778

CVSS v3 Score
5.3
Medium

Vulnerability Description

IBM Controller 11.0.0 through 11.0.1 and 11.1.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.

CVSS:5.3(Medium)

In Textpattern 4.5.7, the password-reset feature does not securely tether a hash to a user account.

CVSS:5.3(Medium)

Use of weak credentials exists in Seiko Solutions SkyBridge and SkySpider series, which may allow a remote unauthenticated attacker to decrypt password for the WebUI of the product. Affected products ...

CVSS:5.3(Medium)

The LoMag WareHouse Management application version 1.0.20.120 and older were found to allow weak passwords. By default, hard-coded passwords of 10 characters with little or no complexity are allowed.

CVSS:5.3(Medium)

A vulnerability has been identified in Location Intelligence family (All versions < V4.4). Affected products do not properly enforce a strong user password policy. This could facilitate a brute force ...

CVSS:5.3(Medium)

The goTenna Pro App uses a weak password for sharing encryption keys via the key broadcast method. If the broadcasted encryption key is captured over RF, and password is cracked via brute force attack...

CVSS:5.4(Medium)

Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.9.