Описание
Microweber CMS 2.0 has Weak Password Requirements. The application does not enforce minimum password length or complexity during password resets. Users can set extremely weak passwords, including single-character passwords, which can lead to account compromise, including administrative accounts.
Ссылки
- ExploitThird Party Advisory
- Product
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:microweber:microweber:2.0.0:*:*:*:*:*:*:*
EPSS
Процентиль: 19%
0.00061
Низкий
8.3 High
CVSS3
Дефекты
CWE-521
Связанные уязвимости
CVSS3: 8.3
github
4 месяца назад
Microweber CMS 2.0 has Weak Password Requirements. The application does not enforce minimum password length or complexity during password resets. Users can set extremely weak passwords, including single-character passwords, which can lead to account compromise, including administrative accounts.
EPSS
Процентиль: 19%
0.00061
Низкий
8.3 High
CVSS3
Дефекты
CWE-521