Show filters
24 Total Results
Displaying 11-20 of 24
Sort by:
Attacker Value
Unknown
CVE-2024-7558
Disclosure Date: October 02, 2024 (last updated February 26, 2025)
JUJU_CONTEXT_ID is a predictable authentication secret. On a Juju machine (non-Kubernetes) or Juju charm container (on Kubernetes), an unprivileged user in the same network namespace can connect to an abstract domain socket and guess the JUJU_CONTEXT_ID value. This gives the unprivileged user access to the same information and tools as the Juju charm.
0
Attacker Value
Unknown
CVE-2024-40892
Disclosure Date: August 12, 2024 (last updated February 26, 2025)
A weak credential vulnerability exists in Firewalla Box Software versions before 1.979. This vulnerability allows a physically close attacker to use the license UUID for authentication and provision SSH credentials over the Bluetooth Low-Energy (BTLE) interface. Once an attacker gains access to the LAN, they could log into the SSH interface using the provisioned credentials. The license UUID can be acquired through plain-text Bluetooth sniffing, reading the QR code on the bottom of the device, or brute-forcing the UUID (though this is less likely).
0
Attacker Value
Unknown
CVE-2024-42051
Disclosure Date: July 28, 2024 (last updated February 26, 2025)
The MSI installer for Splashtop Streamer for Windows before 3.6.2.0 uses a temporary folder with weak permissions during installation. A local user can exploit this to escalate privileges to SYSTEM by replacing InstRegExp.reg.
0
Attacker Value
Unknown
CVE-2024-32759
Disclosure Date: July 10, 2024 (last updated February 26, 2025)
Under certain circumstances the Software House C●CURE 9000 installer will utilize weak credentials.
0
Attacker Value
Unknown
CVE-2024-5634
Disclosure Date: July 09, 2024 (last updated February 26, 2025)
Longse model LBH30FE200W cameras, as well as products based on this device, make use of telnet passwords which follow a specific pattern. Once the pattern is known, brute-forcing the password becomes relatively easy.
Additionally, every camera with the same firmware version shares the same password.
0
Attacker Value
Unknown
CVE-2024-33849
Disclosure Date: May 28, 2024 (last updated February 26, 2025)
ci solution CI-Out-of-Office Manager through 6.0.0.77 uses a Hard-coded Cryptographic Key.
0
Attacker Value
Unknown
CVE-2024-28066
Disclosure Date: April 08, 2024 (last updated February 26, 2025)
In Unify CP IP Phone firmware 1.10.4.3, Weak Credentials are used (a hardcoded root password).
0
Attacker Value
Unknown
CVE-2024-1039
Disclosure Date: February 01, 2024 (last updated February 26, 2025)
Gessler GmbH WEB-MASTER has a restoration account that uses weak hard coded credentials and if exploited could allow an attacker control over the web management of the device.
0
Attacker Value
Unknown
CVE-2023-48257
Disclosure Date: January 10, 2024 (last updated February 25, 2025)
The vulnerability allows a remote attacker to access sensitive data inside exported packages or obtain up to Remote Code Execution (RCE) with root privileges on the device. The vulnerability can be exploited directly by authenticated users, via crafted HTTP requests, or indirectly by unauthenticated users, by accessing already-exported backup packages, or crafting an import package and inducing an authenticated victim into sending the HTTP upload request.
0
Attacker Value
Unknown
CVE-2022-3010
Disclosure Date: January 02, 2024 (last updated February 25, 2025)
The Priva TopControl Suite contains predictable credentials for the SSH service, based on the Serial number. Which makes it possible for an attacker to calculate the login credentials for the Priva TopControll suite.
0