Invicti detected weak credentials.
Depending on the nature of the password-protected resource, an attacker can mount one or more of the following types of attacks:
Do not use weak passwords, which are short, default, common or easy to guess. Implement a strong password policy.
You can search and find all vulnerabilities