Show filters
185 Total Results
Displaying 1-10 of 185
Sort by:
Attacker Value
Unknown
CVE-2020-11951
Disclosure Date: July 14, 2020 (last updated February 21, 2025)
An issue was discovered on Rittal PDU-3C002DEC through 5.17.10 and CMCIII-PU-9333E0FB through 3.17.10 devices. There is a Backdoor root account.
3
Attacker Value
Moderate
CVE-2020-3158
Disclosure Date: February 20, 2020 (last updated February 21, 2025)
A vulnerability in the High Availability (HA) service of Cisco Smart Software Manager On-Prem could allow an unauthenticated, remote attacker to access a sensitive part of the system with a high-privileged account. The vulnerability is due to a system account that has a default and static password and is not under the control of the system administrator. An attacker could exploit this vulnerability by using this default account to connect to the affected system. A successful exploit could allow the attacker to obtain read and write access to system data, including the configuration of an affected device. The attacker would gain access to a sensitive portion of the system, but the attacker would not have full administrative rights to control the device.
0
Attacker Value
Moderate
CVE-2020-13166
Disclosure Date: May 19, 2020 (last updated February 21, 2025)
The management tool in MyLittleAdmin 3.8 allows remote attackers to execute arbitrary code because machineKey is hardcoded (the same for all customers' installations) in web.config, and can be used to send serialized ASP code.
0
Attacker Value
High
CVE-2020-4429
Disclosure Date: April 21, 2020 (last updated February 21, 2025)
IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 contains a default password for an IDRM administrative account. A remote attacker could exploit this vulnerability to login and execute arbitrary code on the system with root privileges. IBM X-Force ID: 180534.
0
Attacker Value
Unknown
CVE-2020-10206
Disclosure Date: December 30, 2020 (last updated February 22, 2025)
Use of a Hard-coded Password in VNCserver in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows local attackers to view and interact with the video output of the device.
0
Attacker Value
Unknown
CVE-2020-10207
Disclosure Date: December 29, 2020 (last updated February 22, 2025)
Use of Hard-coded Credentials in EntoneWebEngine in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows remote attackers to retrieve and modify the device settings.
0
Attacker Value
Unknown
CVE-2020-10210
Disclosure Date: December 29, 2020 (last updated February 22, 2025)
Because of hard-coded SSH keys for the root user in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series, Kami7B, an attacker may remotely log in through SSH.
0
Attacker Value
Unknown
CVE-2020-29193
Disclosure Date: December 28, 2020 (last updated February 22, 2025)
Panasonic Security System WV-S2231L 4.25 has an insecure hard-coded password of lkjhgfdsa (which is just the asdf keyboard row in reverse order).
0
Attacker Value
Unknown
CVE-2020-11719
Disclosure Date: December 23, 2020 (last updated February 22, 2025)
An issue was discovered in Programi Bilanc build 007 release 014 31.01.2020 and possibly below. It relies on broken encryption with a weak and guessable static encryption key.
0
Attacker Value
Unknown
CVE-2020-11720
Disclosure Date: December 23, 2020 (last updated February 22, 2025)
An issue was discovered in Programi Bilanc build 007 release 014 31.01.2020 and possibly below. During the installation, it sets up administrative access by default with the account admin and password 0000. After the installation, users/admins are not prompted to change this password.
0