You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
your website allows users to set their password too simply, at this time, I can put my password to 12345678 Determine the resistance of the application against brute force password guessing using available password dictionaries by evaluating the length, complexity, reuse, and aging requirements of passwords.
it would be best if you made a password policy to protect your user, Uppercase, and lowercase. as it makes it much more secure it will be acceptable
Step to reproduce
change the password to 12345678 with a password reset
Impact:
a website allowing users to set their password too simple
The text was updated successfully, but these errors were encountered:
Reported by Kunal Mhaske [email protected]
Vulnerability Name: Weak Password Policy and password didn't have a limit.
Target URL: https://ctl.ptah.sh/
Vulnerable URL: https://ctl.ptah.sh/user/profile
Description:
your website allows users to set their password too simply, at this time, I can put my password to 12345678 Determine the resistance of the application against brute force password guessing using available password dictionaries by evaluating the length, complexity, reuse, and aging requirements of passwords.
it would be best if you made a password policy to protect your user, Uppercase, and lowercase. as it makes it much more secure it will be acceptable
Step to reproduce
change the password to 12345678 with a password reset
Impact:
a website allowing users to set their password too simple
The text was updated successfully, but these errors were encountered: