{"id":"CVE-2022-37163","details":"Bminusl IHateToBudget v1.5.7 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes.","modified":"2026-04-12T05:39:47.408333Z","published":"2022-09-08T16:15:08.843Z","references":[{"type":"ADVISORY","url":"https://gainsec.com/2022/08/07/cve-2022-hardcoded-creds-weak-password-hauk-android-location-sharing/"},{"type":"REPORT","url":"https://github.com/bminusl/ihatetobudget/issues/24"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/lebriton/ihatetobudget","events":[{"introduced":"0"},{"last_affected":"92a2187b2f3a2dd80a510d9b9bed3a6d129fdb14"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"1.5.7"}],"cpe":"cpe:2.3:a:ihatetobudget_project:ihatetobudget:1.5.7:*:*:*:*:*:*:*"}}],"versions":["v1.0.0","v1.1.0","v1.2.0","v1.3.0","v1.3.1","v1.4.0","v1.4.1","v1.5.0","v1.5.1","v1.5.2","v1.5.3","v1.5.4","v1.5.5","v1.5.6","v1.5.7"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-37163.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}