Show filters
456 Total Results
Displaying 51-60 of 456
Sort by:
Attacker Value
Unknown
CVE-2021-34870
Disclosure Date: January 25, 2022 (last updated February 23, 2025)
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR XR1000 1.0.0.52_1.0.38 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of SOAP messages. The issue results from a lack of authentication required for a privileged request. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-13325.
0
Attacker Value
Unknown
CVE-2022-23945
Disclosure Date: January 25, 2022 (last updated February 23, 2025)
Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
0
Attacker Value
Unknown
CVE-2022-23944
Disclosure Date: January 25, 2022 (last updated February 23, 2025)
User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
0
Attacker Value
Unknown
CVE-2021-33843
Disclosure Date: January 21, 2022 (last updated February 23, 2025)
Fresenius Kabi Agilia SP MC WiFi vD25 and prior has a default configuration page accessible without authentication. An attacker may use this functionality to change the exposed configuration values such as network settings.
0
Attacker Value
Unknown
CVE-2022-23220
Disclosure Date: January 21, 2022 (last updated February 23, 2025)
USBView 2.1 before 2.2 allows some local users (e.g., ones logged in via SSH) to execute arbitrary code as root because certain Polkit settings (e.g., allow_any=yes) for pkexec disable the authentication requirement. Code execution can, for example, use the --gtk-module option. This affects Ubuntu, Debian, and Gentoo.
0
Attacker Value
Unknown
CVE-2021-35587
Disclosure Date: January 19, 2022 (last updated February 23, 2025)
Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
0
Attacker Value
Unknown
CVE-2021-23843
Disclosure Date: January 19, 2022 (last updated February 23, 2025)
The Bosch software tools AccessIPConfig.exe and AmcIpConfig.exe are used to configure certains settings in AMC2 devices. The tool allows putting a password protection on configured devices to restrict access to the configuration of an AMC2. An attacker can circumvent this protection and make unauthorized changes to configuration data on the device. An attacker can exploit this vulnerability to manipulate the device\'s configuration or make it unresponsive in the local network. The attacker needs to have access to the local network, typically even the same subnet.
0
Attacker Value
Unknown
CVE-2022-21691
Disclosure Date: January 18, 2022 (last updated February 23, 2025)
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions chat participants can spoof their channel leave message, tricking others into assuming they left the chatroom.
0
Attacker Value
Unknown
CVE-2022-23227
Disclosure Date: January 14, 2022 (last updated February 23, 2025)
NUUO NVRmini2 through 3.11 allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users because of the lack of handle_import_user.php authentication. When combined with another flaw (CVE-2011-5325), it is possible to overwrite arbitrary files under the web root and achieve code execution as root.
0
Attacker Value
Unknown
CVE-2021-28506
Disclosure Date: January 11, 2022 (last updated February 23, 2025)
An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device.
0