Show filters
340 Total Results
Displaying 21-30 of 340
Sort by:
Attacker Value
Unknown

CVE-2021-40494

Disclosure Date: September 03, 2021 (last updated February 23, 2025)
A Hardcoded JWT Secret Key in metadata.py in AdaptiveScale LXDUI through 2.1.3 allows attackers to gain admin access to the host system.
Attacker Value
Unknown

CVE-2021-34571

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
Multiple Wireless M-Bus devices by Enbra use Hard-coded Credentials in Security mode 5 without an option to change the encryption key. An adversary can learn all information that is available in Enbra EWM.
Attacker Value
Unknown

CVE-2021-36234

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
Use of a hard-coded cryptographic key in MIK.starlight 7.9.5.24363 allows local users to decrypt credentials via unspecified vectors.
Attacker Value
Unknown

CVE-2021-29728

Disclosure Date: August 27, 2021 (last updated February 23, 2025)
IBM Sterling Secure Proxy 6.0.1, 6.0.2, 2.4.3.2, and 3.4.3.2 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 201160.
Attacker Value
Unknown

CVE-2021-39613

Disclosure Date: August 23, 2021 (last updated February 23, 2025)
D-Link DVG-3104MS version 1.0.2.0.3, 1.0.2.0.4, and 1.0.2.0.4E contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file. As weak passwords have been used, the plaintext passwords can be recovered from the hash values. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Attacker Value
Unknown

CVE-2021-39615

Disclosure Date: August 23, 2021 (last updated February 23, 2025)
D-Link DSR-500N version 1.02 contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file.If an attacker succeeds in recovering the cleartext password of the identified hash value, he will be able to log in via SSH or Telnet and thus gain access to the underlying embedded Linux operating system on the device. Fixed in version 2.12/2. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Attacker Value
Unknown

CVE-2021-39614

Disclosure Date: August 23, 2021 (last updated February 23, 2025)
D-Link DVX-2000MS contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file. As weak passwords have been used, the plaintext passwords can be recovered from the hash values.
Attacker Value
Unknown

CVE-2021-39245

Disclosure Date: August 23, 2021 (last updated February 23, 2025)
Hardcoded .htaccess Credentials for getlogs.cgi exist on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX3020 1.8.3.0, Nexto NX3030 1.8.3.0, Nexto NX5100 1.8.11.0, Nexto NX5101 1.8.11.0, Nexto NX5110 1.1.2.8, Nexto NX5210 1.1.2.8, Nexto Xpress XP300 1.8.11.0, Nexto Xpress XP315 1.8.11.0, Nexto Xpress XP325 1.8.11.0, Nexto Xpress XP340 1.8.11.0, and Hadron Xtorm HX3040 1.7.58.0.
Attacker Value
Unknown

CVE-2021-38461

Disclosure Date: August 19, 2021 (last updated February 23, 2025)
The affected product uses a hard-coded blowfish key for encryption/decryption processes. The key can be easily extracted from binaries.
Attacker Value
Unknown

CVE-2021-32588

Disclosure Date: August 18, 2021 (last updated February 23, 2025)
A use of hard-coded credentials (CWE-798) vulnerability in FortiPortal versions 5.2.5 and below, 5.3.5 and below, 6.0.4 and below, versions 5.1.x and 5.0.x may allow a remote and unauthenticated attacker to execute unauthorized commands as root by uploading and deploying malicious web application archive files using the default hard-coded Tomcat Manager username and password.