Show filters
39 Total Results
Displaying 1-10 of 39
Sort by:
Attacker Value
Unknown
CVE-2021-35965
Disclosure Date: July 19, 2021 (last updated February 23, 2025)
The Orca HCM digital learning platform uses a weak factory default administrator password, which is hard-coded in the source code of the webpage in plain text, thus remote attackers can obtain administrator’s privilege without logging in.
0
Attacker Value
Unknown
CVE-2020-12732
Disclosure Date: July 15, 2021 (last updated February 23, 2025)
DEPSTECH WiFi Digital Microscope 3 has a default SSID of Jetion_xxxxxxxx with a password of 12345678.
0
Attacker Value
Unknown
CVE-2021-0144
Disclosure Date: July 14, 2021 (last updated February 23, 2025)
Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2021-35336
Disclosure Date: July 01, 2021 (last updated February 22, 2025)
Tieline IP Audio Gateway 2.6.4.8 and below is affected by Incorrect Access Control. A vulnerability in the Tieline Web Administrative Interface could allow an unauthenticated user to access a sensitive part of the system with a high privileged account.
0
Attacker Value
Unknown
CVE-2021-0534
Disclosure Date: June 22, 2021 (last updated February 22, 2025)
In permission declarations of DeviceAdminReceiver.java, there is a possible lack of broadcast protection due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-170639543
0
Attacker Value
Unknown
CVE-2021-34203
Disclosure Date: June 16, 2021 (last updated February 22, 2025)
D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), when setting PPPoE, will start quagga process in the way of whole network monitoring, and this function uses the original default password and port. An attacker can easily use telnet to log in, modify routing information, monitor the traffic of all devices under the router, hijack DNS and phishing attacks. In addition, this interface is likely to be questioned by customers as a backdoor, because the interface should not be exposed.
0
Attacker Value
Unknown
CVE-2021-21505
Disclosure Date: May 05, 2021 (last updated February 22, 2025)
Dell EMC Integrated System for Microsoft Azure Stack Hub, versions 1906 – 2011, contain an undocumented default iDRAC account. A remote unauthenticated attacker, with the knowledge of the default credentials, could potentially exploit this to log in to the system to gain root privileges.
0
Attacker Value
Unknown
CVE-2021-0468
Disclosure Date: April 13, 2021 (last updated February 22, 2025)
In LK, there is a possible escalation of privilege due to an insecure default value. This could lead to local escalation of privilege for an attacker who has physical access to the device with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-180427272
0
Attacker Value
Unknown
CVE-2021-28123
Disclosure Date: April 02, 2021 (last updated February 22, 2025)
Undocumented Default Cryptographic Key Vulnerability in Cohesity DataPlatform version 6.3 prior 6.3.1g, 6.4 up to 6.4.1c and 6.5.1 through 6.5.1b. The ssh key can provide an attacker access to the linux system in the affected version.
0
Attacker Value
Unknown
CVE-2020-11915
Disclosure Date: February 08, 2021 (last updated February 22, 2025)
An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. By sending a set_params.cgi?telnetd=1&save=1&reboot=1 request to the webserver, it is possible to enable the telnet interface on the device. The telnet interface can then be used to obtain access to the device with root privileges via a reecam4debug default password. This default telnet password is the same across all Siime Eye devices. In order for the attack to be exploited, an attacker must be physically close in order to connect to the device's Wi-Fi access point.
0