Total
965 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-26511 | 1 Propius | 1 Machineselector | 2023-03-20 | N/A | 9.8 CRITICAL |
A Hard Coded Admin Credentials issue in the Web-UI Admin Panel in Propius MachineSelector 6.6.0 and 6.6.1 allows remote attackers to gain access to the admin panel Propiusadmin.php, which allows taking control of the affected system. | |||||
CVE-2023-27583 | 1 Panindex Project | 1 Panindex | 2023-03-17 | N/A | 9.8 CRITICAL |
PanIndex is a network disk directory index. In Panindex prior to version 3.1.3, a hard-coded JWT key `PanIndex` is used. An attacker can use the hard-coded JWT key to sign JWT token and perform any actions as a user with admin privileges. Version 3.1.3 has a patch for the issue. As a workaround, one may change the JWT key in the source code before compiling the project. | |||||
CVE-2023-0345 | 1 Akuvox | 2 E11, E11 Firmware | 2023-03-16 | N/A | 9.8 CRITICAL |
The Akuvox E11 secure shell (SSH) server is enabled by default and can be accessed by the root user. This password cannot be changed by the user. | |||||
CVE-2023-1269 | 1 Easyappointments | 1 Easyappointments | 2023-03-14 | N/A | 9.8 CRITICAL |
Use of Hard-coded Credentials in GitHub repository alextselegidis/easyappointments prior to 1.5.0. | |||||
CVE-2023-22344 | 1 Dos-osaka | 2 Rakuraku Pc Cloud Agent, Ss1 | 2023-03-13 | N/A | 9.8 CRITICAL |
Use of hard-coded credentials vulnerability in SS1 Ver.13.0.0.40 and earlier and Rakuraku PC Cloud Agent Ver.2.1.8 and earlier allows a remote attacker to obtain the password of the debug tool and execute it. As a result of exploiting this vulnerability with CVE-2023-22335 and CVE-2023-22336 vulnerabilities together, it may allow a remote attacker to execute an arbitrary code with SYSTEM privileges by sending a specially crafted script to the affected device. | |||||
CVE-2023-25823 | 1 Gradio Project | 1 Gradio | 2023-03-07 | N/A | 9.8 CRITICAL |
Gradio is an open-source Python library to build machine learning and data science demos and web applications. Versions prior to 3.13.1 contain Use of Hard-coded Credentials. When using Gradio's share links (i.e. creating a Gradio app and then setting `share=True`), a private SSH key is sent to any user that connects to the Gradio machine, which means that a user could access other users' shared Gradio demos. From there, other exploits are possible depending on the level of access/exposure the Gradio app provides. This issue is patched in version 3.13.1, however, users are recommended to update to 3.19.1 or later where the FRP solution has been properly tested. | |||||
CVE-2019-12797 | 1 Elmelectronics | 2 Elm27, Elm27 Firmware | 2023-03-03 | 7.5 HIGH | 9.8 CRITICAL |
A clone version of an ELM327 OBD2 Bluetooth device has a hardcoded PIN, leading to arbitrary commands to an OBD-II bus of a vehicle. | |||||
CVE-2020-35137 | 1 Mobileiron | 1 Mobile\@work | 2023-03-03 | 4.3 MEDIUM | 7.5 HIGH |
** DISPUTED ** The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded API key, used to communicate with the MobileIron SaaS discovery API, as demonstrated by Mobile@Work (aka com.mobileiron). The key is in com/mobileiron/registration/RegisterActivity.java and can be used for api/v1/gateway/customers/servers requests. NOTE: Vendor states that this is an opt-in feature to the product - it is not enabled by default and customers cannot enable it without an explicit email to support. At this time, they do not plan change to make any changes to this feature. | |||||
CVE-2023-26462 | 1 Thingsboard | 1 Thingsboard | 2023-03-02 | N/A | 9.8 CRITICAL |
ThingsBoard 3.4.1 could allow a remote attacker to gain elevated privileges because hard-coded service credentials (usable for privilege escalation) are stored in an insecure format. (To read this stored data, the attacker needs access to the application server or its source code.) | |||||
CVE-2022-46637 | 1 Prolink2u | 2 Prs1841, Prs1841 Firmware | 2023-03-02 | N/A | 9.8 CRITICAL |
Prolink router PRS1841 was discovered to contain hardcoded credentials for its Telnet and FTP services. | |||||
CVE-2022-35734 | 1 Hjholdings | 1 Hulu | 2023-03-01 | N/A | 7.5 HIGH |
'Hulu / ????' App for Android from version 3.0.47 to the version prior to 3.1.2 uses a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app. | |||||
CVE-2019-10990 | 1 Redlion | 1 Crimson | 2023-02-28 | 4.3 MEDIUM | 6.5 MEDIUM |
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an attacker to access configuration files. | |||||
CVE-2022-40242 | 1 Ami | 1 Megarac Sp-x | 2023-02-28 | N/A | 9.8 CRITICAL |
MegaRAC Default Credentials Vulnerability | |||||
CVE-2022-40259 | 1 Ami | 1 Megarac Sp-x | 2023-02-23 | N/A | 9.8 CRITICAL |
MegaRAC Default Credentials Vulnerability | |||||
CVE-2022-31619 | 1 Siemens | 1 Teamcenter | 2023-02-23 | 6.5 MEDIUM | 8.8 HIGH |
A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.13), Teamcenter V13.0 (All versions < V13.0.0.9), Teamcenter V13.1 (All versions < V13.1.0.9), Teamcenter V13.2 (All versions < V13.2.0.9), Teamcenter V13.3 (All versions < V13.3.0.3), Teamcenter V14.0 (All versions < V14.0.0.2). Java EE Server Manager HTML Adaptor in Teamcenter consists of default hardcoded credentials. Access to the application allows a user to perform a series of actions that could potentially lead to remote code execution with elevated permissions. | |||||
CVE-2023-0808 | 3 Bosswerk, Deyeinverter, Revolt-power | 6 Inverter, Inverter Firmware, Inverter and 3 more | 2023-02-22 | N/A | 6.8 MEDIUM |
A vulnerability was found in Deye/Revolt/Bosswerk Inverter MW3_15U_5406_1.47/MW3_15U_5406_1.471. It has been rated as problematic. This issue affects some unknown processing of the component Access Point Setting Handler. The manipulation with the input 12345678 leads to use of hard-coded password. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. Upgrading to version MW3_16U_5406_1.53 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-220769 was assigned to this vulnerability. | |||||
CVE-2022-34386 | 1 Dell | 2 Supportassist For Business Pcs, Supportassist For Home Pcs | 2023-02-21 | N/A | 5.5 MEDIUM |
Dell SupportAssist for Home PCs (version 3.11.4 and prior) and SupportAssist for Business PCs (version 3.2.0 and prior) contain cryptographic weakness vulnerability. An authenticated non-admin user could potentially exploit the issue and obtain sensitive information. | |||||
CVE-2023-21426 | 1 Samsung | 1 Android | 2023-02-21 | N/A | 5.5 MEDIUM |
Hardcoded AES key to encrypt cardemulation PINs in NFC prior to SMR Jan-2023 Release 1 allows attackers to access cardemulation PIN. | |||||
CVE-2022-34449 | 1 Dell | 1 Powerpath Management Appliance | 2023-02-21 | N/A | 6.0 MEDIUM |
PowerPath Management Appliance with versions 3.3 & 3.2* contains a Hardcoded Cryptographic Keys vulnerability. Authenticated admin users can exploit the issue that leads to view and modifying sensitive information stored in the application. | |||||
CVE-2022-45766 | 1 Keystorage | 1 Global Facilities Management Software | 2023-02-17 | N/A | 9.1 CRITICAL |
Hardcoded credentials in Global Facilities Management Software (GFMS) Version 3 software distributed by Key Systems Management permits remote attackers to impact availability, confidentiality, accessibility and dependability of electronic key boxes. |