Show filters
320 Total Results
Displaying 11-20 of 320
Sort by:
Attacker Value
Unknown
CVE-2021-27570
Disclosure Date: May 07, 2021 (last updated February 22, 2025)
An issue was discovered in Emote Remote Mouse through 3.015. Attackers can close any running process by sending the process name in a specially crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
0
Attacker Value
Unknown
CVE-2020-36125
Disclosure Date: May 07, 2021 (last updated February 22, 2025)
Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control where password revalidation in sensitive operations can be bypassed remotely by an authenticated attacker through requesting the endpoint directly.
0
Attacker Value
Unknown
CVE-2021-29203
Disclosure Date: May 06, 2021 (last updated February 22, 2025)
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration. HPE has released a software update to resolve the vulnerability in the HPE Edgeline Infrastructure Manager.
0
Attacker Value
Unknown
CVE-2021-31793
Disclosure Date: May 06, 2021 (last updated February 22, 2025)
An issue exists on NightOwl WDB-20-V2 WDB-20-V2_20190314 devices that allows an unauthenticated user to gain access to snapshots and video streams from the doorbell. The binary app offers a web server on port 80 that allows an unauthenticated user to take a snapshot from the doorbell camera via the /snapshot URI.
0
Attacker Value
Unknown
CVE-2020-36333
Disclosure Date: May 05, 2021 (last updated February 22, 2025)
themegrill-demo-importer before 1.6.2 does not require authentication for wiping the database, because of a reset_wizard_actions hook.
0
Attacker Value
Unknown
CVE-2020-35758
Disclosure Date: May 03, 2021 (last updated February 22, 2025)
An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a Authentication Bypass in the Web Interface. This interface does not properly restrict access to internal functionality. Despite presenting a password login page on first access, authentication is not required to access privileged functionality. As such, it's possible to directly access APIs that should not be exposed to an unauthenticated user.
0
Attacker Value
Unknown
CVE-2020-35755
Disclosure Date: May 03, 2021 (last updated February 22, 2025)
An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a luci_service Read_ NVRAM Direct Access Information Leak. The luci_service deamon running on port 7777 provides a sub-category of commands for which Read_ is prepended. Commands in this category are able to directly read the contents of the device configuration NVRAM. The NVRAM contains sensitive information, such as the Wi-Fi password (in cleartext), as well as connected account tokens for services such as Spotify.
0
Attacker Value
Unknown
CVE-2020-35757
Disclosure Date: May 03, 2021 (last updated February 22, 2025)
An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is Unauthenticated Root ADB Access Over TCP. The LS9 web interface provides functionality to access ADB over TCP. This is not enabled by default, but can be enabled by sending a crafted request to a web management interface endpoint. Requests made to this endpoint do not require authentication. As such, any unauthenticated user who is able to access the web interface will be able to gain root privileges on the LS9 module.
0
Attacker Value
Unknown
CVE-2020-35756
Disclosure Date: May 03, 2021 (last updated February 22, 2025)
An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a luci_service GETPASS Configuration Password Information Leak. The luci_service daemon running on port 7777 does not require authentication to return the device configuration password in cleartext when using the GETPASS command. As such, any unauthenticated person with access to port 7777 on the device will be able to leak the user's personal device configuration password by issuing the GETPASS command.
0
Attacker Value
Unknown
CVE-2020-21997
Disclosure Date: April 29, 2021 (last updated February 22, 2025)
Smartwares HOME easy <=1.0.9 is vulnerable to an unauthenticated database backup download and information disclosure vulnerability. An attacker could disclose sensitive and clear-text information resulting in authentication bypass, session hijacking and full system control.
0