- Aastra OpenCom 1000 Default Login
- Allied Telesyn Router/Switch Web interface found with default password
- Areca Raid Storage Manager Default Admin Credentials
- Audemat FMB80 RDS Encoder Default root Credentials
- Avocent KVM Default Login
- Bay Networks Accelar 1200 Switch found with default password
- Blackboard LC3000 Laundry Reader Default Telnet Password
- CAREL pCOWeb Default Account Security Bypass Vulnerability
- CAREL pCOWeb Default root Password
- CS121 UPS Default Admin Credentials
- Cisco Default Telnet Login
- Cisco TANDBERG C Series and E/EX Series Default Credentials Authentication Bypass Vulnerability
- Cisco Video Surveillance Manager Default Root Credentials
- Default password 'debug' for account 'super'
- Default password 'debug' for account 'user'
- Default password 'forgot' for account 'super'
- Default password 'forgot' for account 'user'
- Default password 'public' for account 'public'
- Default password 'swift' for account 'swift'
- Default password ('synnet') for 'debug' account
- Default password (admin) for Linksys Router
- Default password (db2as) for db2as
- Default password (db2fenc1) for db2fenc1
- Default password (db2inst) for db2inst1
- Default password (ibmdb2) for db2as
- Default password (ibmdb2) for db2fenc1
- Default password (ibmdb2) for db2inst1
- Dell KVM Default Login
- Dell Remote Access Controller Default Login
- Device42 DCIM Appliance Manager Default Credentials
- Dlink DIR Multiple Devices Default Login
- F5 Networks BIG-IP Webinterface Default Credentials
- F5 Networks BIG-IQ Webinterface Default Credentials
- Firebird Default Credentials
- Fujitsu KVM Default Login
- Grandstream Devices Backdoor in Telnet Protocol
- Grandstream GXP VOIP Phones Default Credentials
- HP D2D/StorOnce Storage Unit Backdoor
- HP IP Console Switch KVM Default Login
- HP StorageWorks Default Accounts and Directory Traversal Vulnerabilities
- HTTP Brute Force Logins with default Credentials
- IBM GCM16/GCM32 Default Login
- IPMI Anonymous Login Enabled
- IPmux-2L TDM Pseudowire Access Gateway Default Credentials
- IZON IP Cameras Hard-coded Credentials
- Kyocera Printer Default Account Authentication Bypass Vulnerability
- Mobotix Cameras Default Admin Credentials
- Multiple Barracuda Products Security Bypass and Backdoor Unauthorized Access Vulnerabilities
- Multiple IP Video/Camera Server Web Interface Default Admin Credentials
- MySQL weak password
- NEC Enterprise Server Backdoor Unauthorized Access Vulnerability
- Netsynt CRD Voice Router Telnet CLI Default Password
- SMB Brute Force Logins With Default Credentials
- nas4free Default Admin Credentials