Show filters
700 Total Results
Displaying 271-280 of 700
Sort by:
Attacker Value
Unknown

CVE-2022-30296

Disclosure Date: August 18, 2022 (last updated February 24, 2025)
Insufficiently protected credentials in the Intel(R) Datacenter Group Event iOS application, all versions, may allow an unauthenticated user to potentially enable information disclosure via network access.
Attacker Value
Unknown

CVE-2022-29507

Disclosure Date: August 18, 2022 (last updated February 24, 2025)
Insufficiently protected credentials in the Intel(R) Team Blue mobile application in all versions may allow an authenticated user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2022-26844

Disclosure Date: August 18, 2022 (last updated February 24, 2025)
Insufficiently protected credentials in the installation binaries for Intel(R) SEAPI in all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2020-10710

Disclosure Date: August 16, 2022 (last updated February 24, 2025)
A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext password.
Attacker Value
Unknown

CVE-2022-29959

Disclosure Date: August 16, 2022 (last updated February 24, 2025)
Emerson OpenBSI through 2022-04-29 mishandles credential storage. It is an engineering environment for the ControlWave and Bristol Babcock line of RTUs. This environment provides access control functionality through user authentication and privilege management. The credentials for various users are stored insecurely in the SecUsers.ini file by using a simple string transformation rather than a cryptographic mechanism.
Attacker Value
Unknown

CVE-2022-36308

Disclosure Date: August 16, 2022 (last updated February 24, 2025)
Airspan AirVelocity 1500 web management UI displays SNMP credentials in plaintext on software versions older than 15.18.00.2511, and stores SNMPv3 credentials unhashed on the filesystem, enabling anyone with web access to use these credentials to manipulate the eNodeB over SNMP. This issue may affect other AirVelocity and AirSpeed models.
Attacker Value
Unknown

CVE-2022-36307

Disclosure Date: August 16, 2022 (last updated February 24, 2025)
The AirVelocity 1500 prints SNMP credentials on its physically accessible serial port during boot. This was fixed in AirVelocity 1500 software version 15.18.00.2511 and may affect other AirVelocity and AirSpeed models.
Attacker Value
Unknown

CVE-2022-22983

Disclosure Date: August 10, 2022 (last updated February 24, 2025)
VMware Workstation (16.x prior to 16.2.4) contains an unprotected storage of credentials vulnerability. A malicious actor with local user privileges to the victim machine may exploit this vulnerability leading to the disclosure of user passwords of the remote server connected through VMware Workstation.
Attacker Value
Unknown

CVE-2022-34371

Disclosure Date: August 04, 2022 (last updated February 24, 2025)
Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.19, 9.2.1.12, 9.3.0.6, and 9.4.0.3, contain an unprotected transport of credentials vulnerability. A malicious unprivileged network attacker could potentially exploit this vulnerability, leading to full system compromise.
Attacker Value
Unknown

CVE-2022-20914

Disclosure Date: August 03, 2022 (last updated February 24, 2025)
A vulnerability in the External RESTful Services (ERS) API of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to obtain sensitive information. This vulnerability is due to excessive verbosity in a specific REST API output. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain sensitive information, including administrative credentials for an external authentication server. Note: To successfully exploit this vulnerability, the attacker must have valid ERS administrative credentials.