Show filters
340 Total Results
Displaying 21-30 of 340
Sort by:
Attacker Value
Unknown
CVE-2021-40494
Disclosure Date: September 03, 2021 (last updated February 23, 2025)
A Hardcoded JWT Secret Key in metadata.py in AdaptiveScale LXDUI through 2.1.3 allows attackers to gain admin access to the host system.
0
Attacker Value
Unknown
CVE-2021-34571
Disclosure Date: August 31, 2021 (last updated February 23, 2025)
Multiple Wireless M-Bus devices by Enbra use Hard-coded Credentials in Security mode 5 without an option to change the encryption key. An adversary can learn all information that is available in Enbra EWM.
0
Attacker Value
Unknown
CVE-2021-36234
Disclosure Date: August 31, 2021 (last updated February 23, 2025)
Use of a hard-coded cryptographic key in MIK.starlight 7.9.5.24363 allows local users to decrypt credentials via unspecified vectors.
0
Attacker Value
Unknown
CVE-2021-29728
Disclosure Date: August 27, 2021 (last updated February 23, 2025)
IBM Sterling Secure Proxy 6.0.1, 6.0.2, 2.4.3.2, and 3.4.3.2 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 201160.
0
Attacker Value
Unknown
CVE-2021-39613
Disclosure Date: August 23, 2021 (last updated February 23, 2025)
D-Link DVG-3104MS version 1.0.2.0.3, 1.0.2.0.4, and 1.0.2.0.4E contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file. As weak passwords have been used, the plaintext passwords can be recovered from the hash values. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
0
Attacker Value
Unknown
CVE-2021-39615
Disclosure Date: August 23, 2021 (last updated February 23, 2025)
D-Link DSR-500N version 1.02 contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file.If an attacker succeeds in recovering the cleartext password of the identified hash value, he will be able to log in via SSH or Telnet and thus gain access to the underlying embedded Linux operating system on the device. Fixed in version 2.12/2. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
0
Attacker Value
Unknown
CVE-2021-39614
Disclosure Date: August 23, 2021 (last updated February 23, 2025)
D-Link DVX-2000MS contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file. As weak passwords have been used, the plaintext passwords can be recovered from the hash values.
0
Attacker Value
Unknown
CVE-2021-39245
Disclosure Date: August 23, 2021 (last updated February 23, 2025)
Hardcoded .htaccess Credentials for getlogs.cgi exist on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX3020 1.8.3.0, Nexto NX3030 1.8.3.0, Nexto NX5100 1.8.11.0, Nexto NX5101 1.8.11.0, Nexto NX5110 1.1.2.8, Nexto NX5210 1.1.2.8, Nexto Xpress XP300 1.8.11.0, Nexto Xpress XP315 1.8.11.0, Nexto Xpress XP325 1.8.11.0, Nexto Xpress XP340 1.8.11.0, and Hadron Xtorm HX3040 1.7.58.0.
0
Attacker Value
Unknown
CVE-2021-38461
Disclosure Date: August 19, 2021 (last updated February 23, 2025)
The affected product uses a hard-coded blowfish key for encryption/decryption processes. The key can be easily extracted from binaries.
0
Attacker Value
Unknown
CVE-2021-32588
Disclosure Date: August 18, 2021 (last updated February 23, 2025)
A use of hard-coded credentials (CWE-798) vulnerability in FortiPortal versions 5.2.5 and below, 5.3.5 and below, 6.0.4 and below, versions 5.1.x and 5.0.x may allow a remote and unauthenticated attacker to execute unauthorized commands as root by uploading and deploying malicious web application archive files using the default hard-coded Tomcat Manager username and password.
0