Show filters
32 Total Results
Displaying 1-10 of 32
Sort by:
Attacker Value
Unknown
CVE-2020-11915
Disclosure Date: February 08, 2021 (last updated February 22, 2025)
An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. By sending a set_params.cgi?telnetd=1&save=1&reboot=1 request to the webserver, it is possible to enable the telnet interface on the device. The telnet interface can then be used to obtain access to the device with root privileges via a reecam4debug default password. This default telnet password is the same across all Siime Eye devices. In order for the attack to be exploited, an attacker must be physically close in order to connect to the device's Wi-Fi access point.
0
Attacker Value
Unknown
CVE-2020-10552
Disclosure Date: February 05, 2021 (last updated February 22, 2025)
An issue was discovered in Psyprax before 3.2.2. The Firebird database is accessible with the default user sysdba and password masterke after installation. This allows any user to access it and read and modify the contents, including passwords. Local database files can be accessed directly as well.
0
Attacker Value
Unknown
CVE-2019-20470
Disclosure Date: February 01, 2021 (last updated February 22, 2025)
An issue was discovered on TK-Star Q90 Junior GPS horloge 3.1042.9.8656 devices. It performs actions based on certain SMS commands. This can be used to set up a voice communication channel from the watch to any telephone number, initiated by sending a specific SMS and using the default password, e.g., pw,<password>,call,<mobile_number> triggers an outbound call from the watch. The password is sometimes available because of CVE-2019-20471.
0
Attacker Value
Unknown
CVE-2020-0019
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
In the Broadcom Nexus firmware, there is an insecure default password. This could lead to local information disclosure in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-171413798
0
Attacker Value
Unknown
CVE-2020-0099
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
In addWindow of WindowManagerService.java, there is a possible window overlay attack due to an insecure default value. This could lead to local escalation of privilege via tapjacking with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-141745510
0
Attacker Value
Unknown
CVE-2020-4001
Disclosure Date: November 24, 2020 (last updated February 22, 2025)
The SD-WAN Orchestrator 3.3.2, 3.4.x, and 4.0.x has default passwords allowing for a Pass-the-Hash Attack. SD-WAN Orchestrator ships with default passwords for predefined accounts which may lead to to a Pass-the-Hash attack.
0
Attacker Value
Unknown
CVE-2020-27555
Disclosure Date: November 17, 2020 (last updated February 22, 2025)
Use of default credentials for the telnet server in BASETech GE-131 BT-1837836 firmware 20180921 allows remote attackers to execute arbitrary system commands as the root user.
0
Attacker Value
Unknown
CVE-2020-26510
Disclosure Date: November 16, 2020 (last updated February 22, 2025)
Airleader Master <= 6.21 devices have default credentials that can be used to access the exposed Tomcat Manager for deployment of a new .war file, with resultant remote code execution.
0
Attacker Value
Unknown
CVE-2020-12327
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Insecure default variable initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2020-12336
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.
0