Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2021-35050
Disclosure Date: June 18, 2021 (last updated February 22, 2025)
User credentials stored in a recoverable format within Fidelis Network and Deception CommandPost. In the event that an attacker gains access to the CommandPost, these values could be decoded and used to login to the application. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.3. This vulnerability has been addressed in version 9.3.3 and subsequent versions.
0
Attacker Value
Unknown
CVE-2021-27485
Disclosure Date: June 16, 2021 (last updated February 22, 2025)
ZOLL Defibrillator Dashboard, v prior to 2.2,The application allows users to store their passwords in a recoverable format, which could allow an attacker to retrieve the credentials from the web browser.
0
Attacker Value
Unknown
CVE-2020-8296
Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured.
0
Attacker Value
Unknown
CVE-2021-0220
Disclosure Date: January 13, 2021 (last updated February 22, 2025)
The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a copy of credentials managed by Junos Space. The impact of a successful attack includes, but is not limited to, obtaining access to other servers connected to the Junos Space Management Platform. This issue affects Juniper Networks Junos Space versions prior to 20.3R1.
0
Attacker Value
Unknown
CVE-2019-18256
Disclosure Date: June 29, 2020 (last updated February 21, 2025)
BIOTRONIK CardioMessenger II, The affected products use individual per-device credentials that are stored in a recoverable format. An attacker with physical access to the CardioMessenger can use these credentials for network authentication and decryption of local data in transit.
0
Attacker Value
Unknown
CVE-2019-19096
Disclosure Date: April 02, 2020 (last updated February 21, 2025)
The Redis data structure component used in ABB eSOMS versions 6.0 to 6.0.2 stores credentials in clear text. If an attacker has file system access, this can potentially compromise the credentials' confidentiality.
0