Show filters
38 Total Results
Displaying 1-10 of 38
Sort by:
Attacker Value
Low

CVE-2019-18988

Disclosure Date: February 07, 2020 (last updated February 21, 2025)
TeamViewer Desktop through 14.7.1965 allows a bypass of remote-login access control because the same key is used for different customers' installations. It used a shared AES key for all installations since at least as far back as v7.0.43148, and used it for at least OptionsPasswordAES in the current version of the product. If an attacker were to know this key, they could decrypt protect information stored in the registry or configuration files of TeamViewer. With versions before v9.x , this allowed for attackers to decrypt the Unattended Access password to the system (which allows for remote login to the system as well as headless file browsing). The latest version still uses the same key for OptionPasswordAES but appears to have changed how the Unattended Access password is stored. While in most cases an attacker requires an existing session on a system, if the registry/configuration keys were stored off of the machine (such as in a file share or online), an attacker could then decry…
Attacker Value
Unknown

CVE-2021-25839

Disclosure Date: April 26, 2021 (last updated February 22, 2025)
A weak password requirement vulnerability exists in the Create New User function of MintHCM RELEASE 3.0.8, which could lead an attacker to easier password brute-forcing.
Attacker Value
Unknown

CVE-2021-26797

Disclosure Date: April 26, 2021 (last updated February 22, 2025)
An access control vulnerability in Hame SD1 Wi-Fi firmware <=V.20140224154640 allows an attacker to get system administrator through an open Telnet service.
Attacker Value
Unknown

CVE-2020-11925

Disclosure Date: April 02, 2021 (last updated February 22, 2025)
An issue was discovered in Luvion Grand Elite 3 Connect through 2020-02-25. Authentication to the device is based on a username and password. The root credentials are the same across all devices of this model.
Attacker Value
Unknown

CVE-2020-8296

Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured.
Attacker Value
Unknown

CVE-2021-25309

Disclosure Date: March 02, 2021 (last updated February 22, 2025)
The telnet administrator service running on port 650 on Gigaset DX600A v41.00-175 devices does not implement any lockout or throttling functionality. This situation (together with the weak password policy that forces a 4-digit password) allows remote attackers to easily obtain administrative access via brute-force attacks.
Attacker Value
Unknown

CVE-2020-29591

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.
Attacker Value
Unknown

CVE-2020-26201

Disclosure Date: December 10, 2020 (last updated February 22, 2025)
Askey AP5100W_Dual_SIG_1.01.097 and all prior versions use a weak password at the Operating System (rlx-linux) level. This allows an attacker to gain unauthorized access as an admin or root user to the device Operating System via Telnet or SSH.
Attacker Value
Unknown

CVE-2020-27587

Disclosure Date: November 30, 2020 (last updated February 22, 2025)
Quick Heal Total Security before 19.0 allows attackers with local admin rights to obtain access to files in the File Vault via a brute-force attack on the password.
Attacker Value
Unknown

CVE-2020-27585

Disclosure Date: November 30, 2020 (last updated February 22, 2025)
Quick Heal Total Security before 19.0 allows attackers with local admin rights to modify sensitive anti virus settings via a brute-attack on the settings password.