Show filters
526 Total Results
Displaying 71-80 of 526
Sort by:
Attacker Value
Unknown

CVE-2022-32389

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
Isode SWIFT v4.0.2 was discovered to contain hard-coded credentials in the Registry Editor. This allows attackers to access sensitive information such as user credentials and certificates.
Attacker Value
Unknown

CVE-2022-28371

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
On Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 and OutDoorUnit (ODU) 3.33.101.0 devices, the CRTC and ODU RPC endpoints rely on a static certificate for access control. This certificate is embedded in the firmware, and is identical across the fleet of devices. An attacker need only download this firmware and extract the private components of these certificates (from /etc/lighttpd.d/ca.pem and /etc/lighttpd.d/server.pem) to gain access. (The firmware download location is shown in a device's upgrade logs.)
Attacker Value
Unknown

CVE-2022-35857

Disclosure Date: July 13, 2022 (last updated February 24, 2025)
kvf-admin through 2022-02-12 allows remote attackers to execute arbitrary code because deserialization is mishandled. The rememberMe parameter is encrypted with a hardcoded key from the com.kalvin.kvf.common.shiro.ShiroConfig file.
Attacker Value
Unknown

CVE-2022-30627

Disclosure Date: July 13, 2022 (last updated February 24, 2025)
This vulnerability affects all of the company's products that also include the FW versions: update_i90_cv2.021_b20210104, update_i50_v1.0.55_b20200509, update_x6_v2.1.2_b202001127, update_b5_v2.0.9_b20200706. This vulnerability makes it possible to extract from the FW the existing user passwords on their operating systems and passwords.
Attacker Value
Unknown

CVE-2022-30622

Disclosure Date: July 13, 2022 (last updated February 24, 2025)
Disclosure of information - the system allows you to view usernames and passwords without permissions, thus it will be possible to enter the system. Path access: http://api/sys_username_passwd.cmd - The server loads the request clearly by default. Disclosure of hard-coded credit information within the JS code sent to the customer within the Login.js file is a strong user (which is not documented) and also the password, which allow for super-user access. Username: chcadmin, Password: chcpassword.
Attacker Value
Unknown

CVE-2020-4157

Disclosure Date: July 11, 2022 (last updated February 24, 2025)
IBM QRadar Network Security 5.4.0 and 5.5.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174337.
Attacker Value
Unknown

CVE-2020-4150

Disclosure Date: July 10, 2022 (last updated February 24, 2025)
IBM SiteProtector Appliance 3.1.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174142.
Attacker Value
Unknown

CVE-2022-34151

Disclosure Date: July 04, 2022 (last updated February 24, 2025)
Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller.
Attacker Value
Unknown

CVE-2021-40597

Disclosure Date: June 29, 2022 (last updated February 24, 2025)
The firmware of EDIMAX IC-3140W Version 3.11 is hardcoded with Administrator username and password.
Attacker Value
Unknown

CVE-2022-30997

Disclosure Date: June 28, 2022 (last updated February 24, 2025)
Use of hard-coded credentials vulnerability exists in STARDOM FCN Controller and FCJ Controller R4.10 to R4.31, which may allow an attacker with an administrative privilege to read/change configuration settings or update the controller with tampered firmware.