ECB mode is weak
ECB mode will produce the same result for identical blocks (ie: 16 bytes for AES). An attacker could be able to guess the encrypted message. The use of AES in CBC mode with a HMAC is recommended guaranteeing integrity and confidentiality.
Risk:
The ECB mode will produce identical encrypted block for equivalent plain text block. This could allow an attacker that is eavesdropping to guess the content sent. This same property can also allow the recovery of the original message. Futhermore, this cipher mode alone does not guarantee integrity.
Solution: Best and strong Encryption and Decryption
Result:
Sample Password output: O9+96k6mgfTR3J17omQKL0o9rf3O05qNPNNAtissDFwr7tzXi8YVpOiRCGmmbQqw