Show filters
420 Total Results
Displaying 211-220 of 420
Sort by:
Attacker Value
Unknown

CVE-2022-23129

Disclosure Date: January 21, 2022 (last updated February 23, 2025)
Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information.
Attacker Value
Unknown

CVE-2021-31821

Disclosure Date: January 19, 2022 (last updated February 23, 2025)
When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image
Attacker Value
Unknown

CVE-2022-20660

Disclosure Date: January 13, 2022 (last updated February 23, 2025)
A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks.
Attacker Value
Unknown

CVE-2021-45077

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Netgear Nighthawk R6700 version 1.0.4.120 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device.
Attacker Value
Unknown

CVE-2021-20171

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device.
Attacker Value
Unknown

CVE-2021-20162

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Trendnet AC2600 TEW-827DRU version 2.08B01 stores credentials in plaintext. Usernames and passwords are stored in plaintext in the config files on the device. For example, /etc/config/cameo contains the admin password in plaintext.
Attacker Value
Unknown

CVE-2021-35035

Disclosure Date: December 29, 2021 (last updated February 23, 2025)
A cleartext storage of sensitive information vulnerability in the Zyxel NBG6604 firmware could allow a remote, authenticated attacker to obtain sensitive information from the configuration file.
Attacker Value
Unknown

CVE-2021-20827

Disclosure Date: December 24, 2021 (last updated February 23, 2025)
Plaintext storage of a password vulnerability in IDEC PLCs (FC6A Series MICROSmart All-in-One CPU module v2.32 and earlier, FC6A Series MICROSmart Plus CPU module v1.91 and earlier, WindLDR v8.19.1 and earlier, WindEDIT Lite v1.3.1 and earlier, and Data File Manager v2.12.1 and earlier) allows an attacker to obtain the PLC Web server user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the attacker may access the PLC Web server and hijack the PLC, and manipulation of the PLC output and/or suspension of the PLC may be conducted.
Attacker Value
Unknown

CVE-2021-43388

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
Unisys Cargo Mobile Application before 1.2.29 uses cleartext to store sensitive information, which might be revealed in a backup. The issue is addressed by ensuring that the allowBackup flag (in the manifest) is False.
Attacker Value
Unknown

CVE-2021-42066

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
SAP Business One - version 10.0, allows an admin user to view DB password in plain text over the network, which should otherwise be encrypted. For an attacker to discover vulnerable function in-depth application knowledge is required, but once exploited the attacker may be able to completely compromise confidentiality, integrity, and availability of the application.