Show filters
404 Total Results
Displaying 31-40 of 404
Sort by:
Attacker Value
Unknown

CVE-2021-33259

Disclosure Date: October 31, 2021 (last updated February 23, 2025)
Several web interfaces in D-Link DIR-868LW 1.12b have no authentication requirements for access, allowing for attackers to obtain users' DNS query history.
Attacker Value
Unknown

CVE-2021-41157

Disclosure Date: October 26, 2021 (last updated February 23, 2025)
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. By default, SIP requests of the type SUBSCRIBE are not authenticated in the affected versions of FreeSWITCH. Abuse of this security issue allows attackers to subscribe to user agent event notifications without the need to authenticate. This abuse poses privacy concerns and might lead to social engineering or similar attacks. For example, attackers may be able to monitor the status of target SIP extensions. Although this issue was fixed in version v1.10.6, installations upgraded to the fixed version of FreeSWITCH from an older version, may still be vulnerable if the configuration is not updated accordingly. Software upgrades do not update the configuration by default. SIP SUBSCRIBE messages should be authenticated by default so that FreeSWITCH administrators do not need to explicitly set the `auth-subscrip…
0
Attacker Value
Unknown

CVE-2021-37624

Disclosure Date: October 25, 2021 (last updated February 23, 2025)
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.7, FreeSWITCH does not authenticate SIP MESSAGE requests, leading to spam and message spoofing. By default, SIP requests of the type MESSAGE (RFC 3428) are not authenticated in the affected versions of FreeSWITCH. MESSAGE requests are relayed to SIP user agents registered with the FreeSWITCH server without requiring any authentication. Although this behaviour can be changed by setting the `auth-messages` parameter to `true`, it is not the default setting. Abuse of this security issue allows attackers to send SIP MESSAGE messages to any SIP user agent that is registered with the server without requiring authentication. Additionally, since no authentication is required, chat messages can be spoofed to appear to come from trusted entities. Therefore, abuse can lead to spam and enable so…
Attacker Value
Unknown

CVE-2021-27395

Disclosure Date: October 12, 2021 (last updated February 23, 2025)
A vulnerability has been identified in SIMATIC Process Historian 2013 and earlier (All versions), SIMATIC Process Historian 2014 (All versions < SP3 Update 6), SIMATIC Process Historian 2019 (All versions), SIMATIC Process Historian 2020 (All versions). An interface in the software that is used for critical functionalities lacks authentication, which could allow a malicious user to maliciously insert, modify or delete data.
Attacker Value
Unknown

CVE-2021-35979

Disclosure Date: October 08, 2021 (last updated February 23, 2025)
An issue was discovered in Digi RealPort through 4.8.488.0. The 'encrypted' mode is vulnerable to man-in-the-middle attacks and does not perform authentication.
Attacker Value
Unknown

CVE-2021-41974

Disclosure Date: October 08, 2021 (last updated February 23, 2025)
Tad Book3 editing book page does not perform identity verification. Remote attackers can use the vulnerability to view and modify arbitrary content of books without permission.
Attacker Value
Unknown

CVE-2021-41975

Disclosure Date: October 08, 2021 (last updated February 23, 2025)
TadTools special page is vulnerable to authorization bypass, thus remote attackers can use the specific parameter to delete arbitrary files in the system without logging in.
Attacker Value
Unknown

CVE-2021-41568

Disclosure Date: October 08, 2021 (last updated February 23, 2025)
Tad Web is vulnerable to authorization bypass, thus remote attackers can exploit the vulnerability to use the original function of viewing bulletin boards and uploading files in the system.
Attacker Value
Unknown

CVE-2021-41976

Disclosure Date: October 08, 2021 (last updated February 23, 2025)
Tad Uploader edit book list function is vulnerable to authorization bypass, thus remote attackers can use the function to amend the folder names in the book list without logging in.
Attacker Value
Unknown

CVE-2021-42539

Disclosure Date: October 05, 2021 (last updated February 23, 2025)
The affected product is vulnerable to a missing permission validation on system backup restore, which could lead to account take over and unapproved settings change.