Show filters
286 Total Results
Displaying 11-20 of 286
Sort by:
Attacker Value
Unknown

CVE-2021-34812

Disclosure Date: June 17, 2021 (last updated February 22, 2025)
Use of hard-coded credentials vulnerability in php component in Synology Calendar before 2.4.0-0761 allows remote attackers to obtain sensitive information via unspecified vectors.
Attacker Value
Unknown

CVE-2021-31477

Disclosure Date: June 16, 2021 (last updated February 22, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GE Reason RPV311 14A03. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the device. The firmware and filesystem contain hard-coded default credentials. An attacker can leverage this vulnerability to execute code in the context of the download user. Was ZDI-CAN-11852.
Attacker Value
Unknown

CVE-2020-25752

Disclosure Date: June 16, 2021 (last updated February 22, 2025)
An issue was discovered on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the installer and Enphase accounts. The passwords for these accounts are hardcoded values derived from the MD5 hash of the username and serial number mixed with some static strings. The serial number can be retrieved by an unauthenticated user at /info.xml. These passwords can be easily calculated by an attacker; users are unable to change these passwords.
Attacker Value
Unknown

CVE-2021-27481

Disclosure Date: June 16, 2021 (last updated February 22, 2025)
ZOLL Defibrillator Dashboard, v prior to 2.2, The affected products utilize an encryption key in the data exchange process, which is hardcoded. This could allow an attacker to gain access to sensitive information.
Attacker Value
Unknown

CVE-2020-15382

Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Brocade SANnav before version 2.1.1 uses a hard-coded administrator account with the weak password ‘passw0rd’ if a password is not provided for PostgreSQL at install-time.
Attacker Value
Unknown

CVE-2020-29323

Disclosure Date: June 04, 2021 (last updated February 22, 2025)
The D-link router DIR-885L-MFC 1.15b02, v1.21b05 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
Attacker Value
Unknown

CVE-2020-29322

Disclosure Date: June 04, 2021 (last updated February 22, 2025)
The D-Link router DIR-880L 1.07 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
Attacker Value
Unknown

CVE-2020-29321

Disclosure Date: June 04, 2021 (last updated February 22, 2025)
The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
Attacker Value
Unknown

CVE-2021-3565

Disclosure Date: June 04, 2021 (last updated February 22, 2025)
A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.
Attacker Value
Unknown

CVE-2020-1716

Disclosure Date: May 28, 2021 (last updated February 22, 2025)
A flaw was found in the ceph-ansible playbook where it contained hardcoded passwords that were being used as default passwords while deploying Ceph services. Any authenticated attacker can abuse this flaw to brute-force Ceph deployments, and gain administrator access to Ceph clusters via the Ceph dashboard to initiate read, write, and delete Ceph clusters and also modify Ceph cluster configurations. Versions before ceph-ansible 6.0.0alpha1 are affected.