Show filters
402 Total Results
Displaying 191-200 of 402
Sort by:
Attacker Value
Unknown

CVE-2021-42642

Disclosure Date: February 02, 2022 (last updated February 23, 2025)
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the plaintext console username and password for a printer.
Attacker Value
Unknown

CVE-2022-22789

Disclosure Date: January 25, 2022 (last updated February 23, 2025)
Charactell - FormStorm Enterprise Account takeover – An attacker can modify (add, remove and update) passwords file for all the users. The xx_users.ini file in the FormStorm folder contains usernames in cleartext and an obfuscated password. Malicious user can take over an account by replacing existing password in the file.
Attacker Value
Unknown

CVE-2022-23129

Disclosure Date: January 21, 2022 (last updated February 23, 2025)
Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information.
Attacker Value
Unknown

CVE-2021-31821

Disclosure Date: January 19, 2022 (last updated February 23, 2025)
When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image
Attacker Value
Unknown

CVE-2022-20660

Disclosure Date: January 13, 2022 (last updated February 23, 2025)
A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks.
Attacker Value
Unknown

CVE-2021-45077

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Netgear Nighthawk R6700 version 1.0.4.120 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device.
Attacker Value
Unknown

CVE-2021-20171

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device.
Attacker Value
Unknown

CVE-2021-20162

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Trendnet AC2600 TEW-827DRU version 2.08B01 stores credentials in plaintext. Usernames and passwords are stored in plaintext in the config files on the device. For example, /etc/config/cameo contains the admin password in plaintext.
Attacker Value
Unknown

CVE-2021-35035

Disclosure Date: December 29, 2021 (last updated February 23, 2025)
A cleartext storage of sensitive information vulnerability in the Zyxel NBG6604 firmware could allow a remote, authenticated attacker to obtain sensitive information from the configuration file.
Attacker Value
Unknown

CVE-2021-20827

Disclosure Date: December 24, 2021 (last updated February 23, 2025)
Plaintext storage of a password vulnerability in IDEC PLCs (FC6A Series MICROSmart All-in-One CPU module v2.32 and earlier, FC6A Series MICROSmart Plus CPU module v1.91 and earlier, WindLDR v8.19.1 and earlier, WindEDIT Lite v1.3.1 and earlier, and Data File Manager v2.12.1 and earlier) allows an attacker to obtain the PLC Web server user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the attacker may access the PLC Web server and hijack the PLC, and manipulation of the PLC output and/or suspension of the PLC may be conducted.