Show filters
38 Total Results
Displaying 31-38 of 38
Sort by:
Attacker Value
Unknown
CVE-2020-9438
Disclosure Date: June 23, 2020 (last updated February 21, 2025)
Tinxy Door Lock with firmware before 3.2 allow attackers to unlock a door by replaying an Unlock request that occurred when the attacker was previously authorized. In other words, door-access revocation is mishandled.
0
Attacker Value
Unknown
CVE-2020-12692
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
0
Attacker Value
Unknown
CVE-2020-5300
Disclosure Date: April 06, 2020 (last updated February 21, 2025)
In Hydra (an OAuth2 Server and OpenID Certified™ OpenID Connect Provider written in Go), before version 1.4.0+oryOS.17, when using client authentication method 'private_key_jwt' [1], OpenId specification says the following about assertion `jti`: "A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties". Hydra does not check the uniqueness of this `jti` value. Exploiting this vulnerability is somewhat difficult because: - TLS protects against MITM which makes it difficult to intercept valid tokens for replay attacks - The expiry time of the JWT gives only a short window of opportunity where it could be replayed This has been patched in version v1.4.0+oryOS.17
0
Attacker Value
Unknown
CVE-2020-6972
Disclosure Date: March 24, 2020 (last updated February 21, 2025)
In Notifier Web Server (NWS) Version 3.50 and earlier, the Honeywell Fire Web Server’s authentication may be bypassed by a capture-replay attack from a web browser.
0
Attacker Value
Unknown
CVE-2019-20626
Disclosure Date: March 23, 2020 (last updated February 21, 2025)
The remote keyless system on Honda HR-V 2017 vehicles sends the same RF signal for each door-open request, which might allow a replay attack.
0
Attacker Value
Unknown
CVE-2020-10185
Disclosure Date: March 05, 2020 (last updated February 21, 2025)
The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.
0
Attacker Value
Unknown
CVE-2013-1351
Disclosure Date: January 30, 2020 (last updated February 21, 2025)
Verax NMS prior to 2.10 allows authentication via the encrypted password without knowing the cleartext password.
0
Attacker Value
Unknown
CVE-2002-0054
Disclosure Date: March 08, 2002 (last updated February 22, 2025)
SMTP service in (1) Microsoft Windows 2000 and (2) Internet Mail Connector (IMC) in Exchange Server 5.5 does not properly handle responses to NTLM authentication, which allows remote attackers to perform mail relaying via an SMTP AUTH command using null session credentials.
0