Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2021-35050

Disclosure Date: June 18, 2021 (last updated February 22, 2025)
User credentials stored in a recoverable format within Fidelis Network and Deception CommandPost. In the event that an attacker gains access to the CommandPost, these values could be decoded and used to login to the application. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.3. This vulnerability has been addressed in version 9.3.3 and subsequent versions.
Attacker Value
Unknown

CVE-2021-27485

Disclosure Date: June 16, 2021 (last updated February 22, 2025)
ZOLL Defibrillator Dashboard, v prior to 2.2,The application allows users to store their passwords in a recoverable format, which could allow an attacker to retrieve the credentials from the web browser.
Attacker Value
Unknown

CVE-2020-8296

Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured.
Attacker Value
Unknown

CVE-2021-0220

Disclosure Date: January 13, 2021 (last updated February 22, 2025)
The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a copy of credentials managed by Junos Space. The impact of a successful attack includes, but is not limited to, obtaining access to other servers connected to the Junos Space Management Platform. This issue affects Juniper Networks Junos Space versions prior to 20.3R1.
0
Attacker Value
Unknown

CVE-2019-18256

Disclosure Date: June 29, 2020 (last updated February 21, 2025)
BIOTRONIK CardioMessenger II, The affected products use individual per-device credentials that are stored in a recoverable format. An attacker with physical access to the CardioMessenger can use these credentials for network authentication and decryption of local data in transit.
Attacker Value
Unknown

CVE-2019-19096

Disclosure Date: April 02, 2020 (last updated February 21, 2025)
The Redis data structure component used in ABB eSOMS versions 6.0 to 6.0.2 stores credentials in clear text. If an attacker has file system access, this can potentially compromise the credentials' confidentiality.