Количество 2
Количество 2
CVE-2021-36799
KNX ETS5 through 5.7.6 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
GHSA-jj35-9m2c-j64q
KNX ETS5 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-36799 KNX ETS5 through 5.7.6 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information. NOTE: This vulnerability only affects products that are no longer supported by the maintainer | CVSS3: 8.8 | 0% Низкий | больше 4 лет назад | |
GHSA-jj35-9m2c-j64q KNX ETS5 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу