Show filters
374 Total Results
Displaying 31-40 of 374
Sort by:
Attacker Value
Unknown
CVE-2021-41028
Disclosure Date: December 16, 2021 (last updated February 23, 2025)
A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.
0
Attacker Value
Unknown
CVE-2021-26108
Disclosure Date: December 08, 2021 (last updated February 23, 2025)
A use of hard-coded cryptographic key vulnerability in the SSLVPN of FortiOS before 7.0.1 may allow an attacker to retrieve the key by reverse engineering.
0
Attacker Value
Unknown
CVE-2021-43044
Disclosure Date: December 06, 2021 (last updated February 23, 2025)
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The SNMP daemon was configured with a weak default community.
0
Attacker Value
Unknown
CVE-2021-43284
Disclosure Date: November 30, 2021 (last updated February 23, 2025)
An issue was discovered on Victure WR1200 devices through 1.0.3. The root SSH password never gets updated from its default value of admin. This enables an attacker to gain control of the device through SSH (regardless of whether the admin password was changed on the web interface).
0
Attacker Value
Unknown
CVE-2021-43282
Disclosure Date: November 30, 2021 (last updated February 23, 2025)
An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.
0
Attacker Value
Unknown
CVE-2021-26611
Disclosure Date: November 26, 2021 (last updated February 23, 2025)
HejHome GKW-IC052 IP Camera contained a hard-coded credentials vulnerability. This issue allows remote attackers to operate the IP Camera.(reboot, factory reset, snapshot etc..)
0
Attacker Value
Unknown
CVE-2021-32993
Disclosure Date: November 18, 2021 (last updated February 23, 2025)
IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) contains hard-coded credentials, such as a password or a cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
0
Attacker Value
Unknown
CVE-2021-40519
Disclosure Date: November 10, 2021 (last updated February 23, 2025)
Airangel HSMX Gateway devices through 5.2.04 have Hard-coded Database Credentials.
0
Attacker Value
Unknown
CVE-2021-43136
Disclosure Date: November 10, 2021 (last updated February 23, 2025)
An authentication bypass issue in FormaLMS <= 2.4.4 allows an attacker to bypass the authentication mechanism and obtain a valid access to the platform.
0
Attacker Value
Unknown
CVE-2021-43575
Disclosure Date: November 09, 2021 (last updated February 23, 2025)
KNX ETS6 through 6.0.0 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information, a similar issue to CVE-2021-36799. NOTE: The vendor disputes this because it is not the responsibility of the ETS to securely store cryptographic key material when it is not being exported
0