Show filters
402 Total Results
Displaying 181-190 of 402
Sort by:
Attacker Value
Unknown
CVE-2021-45491
Disclosure Date: March 28, 2022 (last updated February 23, 2025)
3CX System through 2022-03-17 stores cleartext passwords in a database.
0
Attacker Value
Unknown
CVE-2022-26148
Disclosure Date: March 21, 2022 (last updated February 23, 2025)
An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.
0
Attacker Value
Unknown
CVE-2022-23234
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
SnapCenter versions prior to 4.5 are susceptible to a vulnerability which could allow a local authenticated attacker to discover plaintext HANA credentials.
0
Attacker Value
Unknown
CVE-2022-26778
Disclosure Date: March 10, 2022 (last updated February 23, 2025)
Veritas System Recovery (VSR) 18 and 21 stores a network destination password in the Windows registry during configuration of the backup configuration. This could allow a Windows user (who has sufficient privileges) to access a network file system that they were not authorized to access.
0
Attacker Value
Unknown
CVE-2021-27757
Disclosure Date: March 04, 2022 (last updated February 23, 2025)
" Insecure password storage issue.The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere.Since the information is stored in cleartext, attackers could potentially read it and gain access to sensitive information."
0
Attacker Value
Unknown
CVE-2021-35036
Disclosure Date: March 01, 2022 (last updated February 23, 2025)
A cleartext storage of information vulnerability in the Zyxel VMG3625-T50B firmware version V5.50(ABTL.0)b2k could allow an authenticated attacker to obtain sensitive information from the configuration file.
0
Attacker Value
Unknown
CVE-2021-3551
Disclosure Date: February 16, 2022 (last updated February 23, 2025)
A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.
0
Attacker Value
Unknown
CVE-2022-21818
Disclosure Date: February 15, 2022 (last updated February 23, 2025)
NVIDIA License System contains a vulnerability in the installation scripts for the DLS virtual appliance, where a user on a network after signing in to the portal can access other users’ credentials, allowing them to gain escalated privileges, resulting in limited impact to both confidentiality and integrity.
0
Attacker Value
Unknown
CVE-2021-43590
Disclosure Date: February 14, 2022 (last updated February 23, 2025)
Dell EMC Enterprise Storage Analytics for vRealize Operations, versions 4.0.1 to 6.2.1, contain a Plain-text password storage vulnerability. A local high privileged malicious user may potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
0
Attacker Value
Unknown
CVE-2021-40363
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions <= V17 Update 4), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system.
0