Show filters
176 Total Results
Displaying 21-30 of 176
Sort by:
Attacker Value
Unknown
CVE-2020-27184
Disclosure Date: May 14, 2021 (last updated February 22, 2025)
The NPort IA5000A Series devices use Telnet as one of the network device management services. Telnet does not support the encryption of client-server communications, making it vulnerable to Man-in-the-Middle attacks.
0
Attacker Value
Unknown
CVE-2021-32456
Disclosure Date: May 13, 2021 (last updated February 22, 2025)
SITEL CAP/PRX firmware version 5.2.01 allows an attacker with access to the local network of the device to obtain the authentication passwords by analysing the network traffic.
0
Attacker Value
Unknown
CVE-2021-20564
Disclosure Date: May 13, 2021 (last updated February 22, 2025)
IBM Cloud Pak for Security (CP4S) 1.4.0.0, 1.5.0.0, 1.5.0.1, 1.6.0.0, and 1.6.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 199235.
0
Attacker Value
Unknown
CVE-2021-31898
Disclosure Date: May 11, 2021 (last updated February 22, 2025)
In JetBrains WebStorm before 2021.1, HTTP requests were used instead of HTTPS.
0
Attacker Value
Unknown
CVE-2021-3003
Disclosure Date: May 10, 2021 (last updated February 22, 2025)
Agenzia delle Entrate Desktop Telematico 1.0.0 contacts the jws.agenziaentrate.it server over cleartext HTTP, which allows man-in-the-middle attackers to spoof product updates.
0
Attacker Value
Unknown
CVE-2021-27569
Disclosure Date: May 07, 2021 (last updated February 22, 2025)
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
0
Attacker Value
Unknown
CVE-2021-27574
Disclosure Date: May 07, 2021 (last updated February 22, 2025)
An issue was discovered in Emote Remote Mouse through 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.
0
Attacker Value
Unknown
CVE-2021-31815
Disclosure Date: April 28, 2021 (last updated February 22, 2025)
GAEN (aka Google/Apple Exposure Notifications) through 2021-04-27 on Android allows attackers to obtain sensitive information, such as a user's location history, in-person social graph, and (sometimes) COVID-19 infection status, because Rolling Proximity Identifiers and MAC addresses are written to the Android system log, and many Android devices have applications (preinstalled by the hardware manufacturer or network operator) that read system log data and send it to third parties. NOTE: a news outlet (The Markup) states that they received a vendor response indicating that fix deployment "began several weeks ago and will be complete in the coming days."
0
Attacker Value
Unknown
CVE-2021-31671
Disclosure Date: April 27, 2021 (last updated February 22, 2025)
pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the --schema-first and --schema-only options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.
0
Attacker Value
Unknown
CVE-2021-3494
Disclosure Date: April 26, 2021 (last updated February 22, 2025)
A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not check the SSL certificate, thus, an unauthenticated attacker can perform actions in FreeIPA if certain conditions are met. The highest threat from this flaw is to system confidentiality. This flaw affects Foreman versions before 2.5.0.
0