Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Use of Weak Credentials

The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker.