Filtered by CWE-261
Total 27 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-28896 1 Preh 2 Mib3, Mib3 Firmware 2024-08-02 3.3 Low
Access to critical Unified Diagnostics Services (UDS) of the Modular Infotainment Platform 3 (MIB3) infotainment is transmitted via Controller Area Network (CAN) bus in a form that can be easily decoded by attackers with physical access to the vehicle. Vulnerability discovered on Škoda Superb III (3V3) - 2.0 TDI manufactured in 2022.
CVE-2023-22271 1 Adobe 2 Experience Manager, Experience Manager Cloud Service 2024-08-02 5.3 Medium
Experience Manager versions 6.5.15.0 (and earlier) are affected by a Weak Cryptography for Passwords vulnerability that can lead to a security feature bypass. A low-privileged attacker can exploit this in order to decrypt a user's password. The attack complexity is high since a successful exploitation requires to already have in possession this encrypted secret.
CVE-2023-7237 1 Lantronix 2 Xport Edge, Xport Edge Firmware 2024-08-02 5.7 Medium
Lantronix XPort sends weakly encoded credentials within web request headers.
CVE-2023-0356 1 Socomec 2 Modulys Gp, Net Vision 2024-08-02 5.7 Medium
SOCOMEC MODULYS GP Netvision versions 7.20 and prior lack strong encryption for credentials on HTTP connections, which could result in threat actors obtaining sensitive information.
CVE-2024-28270 1 Enilu 1 Web-flash 2024-08-02 8.1 High
An issue discovered in web-flash v3.0 allows attackers to reset passwords for arbitrary users via crafted POST request to /prod-api/user/resetPassword.
CVE-2024-23492 2024-08-01 5.7 Medium
A weak encoding is used to transmit credentials for WS203VICM.
CVE-2024-5434 1 Campbellsci 2 Csi Web Server, Rtmc 2024-08-01 N/A
The Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access.