{"api_version":"1","generated_at":"2026-04-23T15:19:58+00:00","cve":"CVE-2021-3130","urls":{"html":"https://cve.report/CVE-2021-3130","api":"https://cve.report/api/cve/CVE-2021-3130.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-3130","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-3130"},"summary":{"title":"CVE-2021-3130","description":"Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-01-20 16:15:00","updated_at":"2022-07-12 17:42:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://raw.githubusercontent.com/B0D0B0P0T/CVE/main/CVE-2021-3130","name":"https://raw.githubusercontent.com/B0D0B0P0T/CVE/main/CVE-2021-3130","refsource":"MISC","tags":["Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://opmantek.com/network-discovery-inventory-software/","name":"https://opmantek.com/network-discovery-inventory-software/","refsource":"MISC","tags":["Vendor Advisory"],"title":"Network Discovery and Inventory Software | Open-AudIT | Opmantek","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-3130","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3130","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"3130","vulnerable":"1","versionEndIncluding":"4.0.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"opmantek","cpe5":"open-audit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-3130","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://opmantek.com/network-discovery-inventory-software/","refsource":"MISC","name":"https://opmantek.com/network-discovery-inventory-software/"},{"refsource":"MISC","name":"https://raw.githubusercontent.com/B0D0B0P0T/CVE/main/CVE-2021-3130","url":"https://raw.githubusercontent.com/B0D0B0P0T/CVE/main/CVE-2021-3130"}]}},"nvd":{"publishedDate":"2021-01-20 16:15:00","lastModifiedDate":"2022-07-12 17:42:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:opmantek:open-audit:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"3130","Ordinal":"198664","Title":"CVE-2021-3130","CVE":"CVE-2021-3130","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"3130","Ordinal":"1","NoteData":"Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"3130","Ordinal":"2","NoteData":"2021-01-20","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"3130","Ordinal":"3","NoteData":"2021-01-20","Type":"Other","Title":"Modified"}]}}}