Browse and filter security vulnerabilities across ecosystems
Browse and filter security vulnerabilities across ecosystems
Tenda AX9 httpd image_check weak hash
Tomofun Furbo 360/Furbo Mini Password shadow weak hash
Dragonfly has weak integrity checks for downloaded files
Weak cache keys lead to post IDOR and link preview poisoning
CWE-328: Use of Weak Hash
FNKvision Y215 CCTV Camera passwd crypt weak hash
In JetBrains TeamCity before 2025
Vaelsys MD4 Hash vgrid_server.php weak hash
Cyberduck and Mountain Duck - Weak Hash Algorithm for Certificate Fingerprint
Deprecated TLS version supported
HCL Glovius Cloud is susceptible to an Outdated Hash Algorithm vulnerability
IBM Sterling Secure Proxy information disclosure
The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow table...
Weidmueller: Authentication Bypass Vulnerability in Industrial Ethernet Switches
Actualizer Uses OpenSSL's "-passwd" Function Which Uses SHA512 Under The Hood Instead of Proper Password Hasher like Yescript/Argon2i
pnpm uses the md5 path shortening function causes packet paths to coincide, which causes indirect packet overwriting
Krb5: kerberos rc4-hmac-md5 checksum vulnerability enabling message spoofing via md5 collisions
gitoxide does not detect SHA-1 collision attacks
Netis WF-2404 passwd weak hash
MD5 Hash Collision in SageMaker Workflow in aws/sagemaker-python-sdk
Showing 1 - 20 of 1,000+ results