Show filters
53 Total Results
Displaying 1-10 of 53
Sort by:
Attacker Value
Low
CVE-2019-18988
Disclosure Date: February 07, 2020 (last updated February 21, 2025)
TeamViewer Desktop through 14.7.1965 allows a bypass of remote-login access control because the same key is used for different customers' installations. It used a shared AES key for all installations since at least as far back as v7.0.43148, and used it for at least OptionsPasswordAES in the current version of the product. If an attacker were to know this key, they could decrypt protect information stored in the registry or configuration files of TeamViewer. With versions before v9.x , this allowed for attackers to decrypt the Unattended Access password to the system (which allows for remote login to the system as well as headless file browsing). The latest version still uses the same key for OptionPasswordAES but appears to have changed how the Unattended Access password is stored. While in most cases an attacker requires an existing session on a system, if the registry/configuration keys were stored off of the machine (such as in a file share or online), an attacker could then decry…
0
Attacker Value
Unknown
CVE-2021-41696
Disclosure Date: December 09, 2021 (last updated February 23, 2025)
An authentication bypass (account takeover) vulnerability exists in Premiumdatingscript 4.2.7.7 due to a weak password reset mechanism in requests\user.php.
0
Attacker Value
Unknown
CVE-2021-43471
Disclosure Date: December 06, 2021 (last updated February 23, 2025)
In Canon LBP223 printers, the System Manager Mode login does not require an account password or PIN. An attacker can remotely shut down the device after entering the background, creating a denial of service vulnerability.
0
Attacker Value
Unknown
CVE-2021-43036
Disclosure Date: December 06, 2021 (last updated February 23, 2025)
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The password for the PostgreSQL wguest account is weak.
0
Attacker Value
Unknown
CVE-2021-20470
Disclosure Date: December 02, 2021 (last updated February 23, 2025)
IBM Cognos Analytics 11.1.7 and 11.2.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 196339.
0
Attacker Value
Unknown
CVE-2021-40333
Disclosure Date: November 23, 2021 (last updated February 23, 2025)
Weak Password Requirements vulnerability in Hitachi Energy FOX61x, XCM20 allows an attacker to gain unauthorized access to the Data Communication Network (DCN) routing configuration. This issue affects: Hitachi Energy FOX61x versions prior to R15A. Hitachi Energy XCM20 versions prior to R15A.
0
Attacker Value
Unknown
CVE-2021-40520
Disclosure Date: November 10, 2021 (last updated February 23, 2025)
Airangel HSMX Gateway devices through 5.2.04 have Weak SSH Credentials.
0
Attacker Value
Unknown
CVE-2021-35498
Disclosure Date: October 13, 2021 (last updated February 23, 2025)
The TIBCO EBX Web Server component of TIBCO Software Inc.'s TIBCO EBX, TIBCO EBX, TIBCO EBX, and TIBCO Product and Service Catalog powered by TIBCO EBX contains a vulnerability that under certain specific conditions allows an attacker to enter a password other than the legitimate password and it will be accepted as valid. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.8.123 and below, TIBCO EBX: versions 5.9.3, 5.9.4, 5.9.5, 5.9.6, 5.9.7, 5.9.8, 5.9.9, 5.9.10, 5.9.11, 5.9.12, 5.9.13, and 5.9.14, TIBCO EBX: versions 6.0.0 and 6.0.1, and TIBCO Product and Service Catalog powered by TIBCO EBX: version 1.0.0.
0
Attacker Value
Unknown
CVE-2021-38462
Disclosure Date: October 07, 2021 (last updated February 23, 2025)
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf.
0
Attacker Value
Unknown
CVE-2021-41296
Disclosure Date: September 30, 2021 (last updated February 23, 2025)
ECOA BAS controller uses weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system.
0