Show filters
176 Total Results
Displaying 21-30 of 176
Sort by:
Attacker Value
Unknown

CVE-2020-27184

Disclosure Date: May 14, 2021 (last updated February 22, 2025)
The NPort IA5000A Series devices use Telnet as one of the network device management services. Telnet does not support the encryption of client-server communications, making it vulnerable to Man-in-the-Middle attacks.
Attacker Value
Unknown

CVE-2021-32456

Disclosure Date: May 13, 2021 (last updated February 22, 2025)
SITEL CAP/PRX firmware version 5.2.01 allows an attacker with access to the local network of the device to obtain the authentication passwords by analysing the network traffic.
Attacker Value
Unknown

CVE-2021-20564

Disclosure Date: May 13, 2021 (last updated February 22, 2025)
IBM Cloud Pak for Security (CP4S) 1.4.0.0, 1.5.0.0, 1.5.0.1, 1.6.0.0, and 1.6.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 199235.
Attacker Value
Unknown

CVE-2021-31898

Disclosure Date: May 11, 2021 (last updated February 22, 2025)
In JetBrains WebStorm before 2021.1, HTTP requests were used instead of HTTPS.
Attacker Value
Unknown

CVE-2021-3003

Disclosure Date: May 10, 2021 (last updated February 22, 2025)
Agenzia delle Entrate Desktop Telematico 1.0.0 contacts the jws.agenziaentrate.it server over cleartext HTTP, which allows man-in-the-middle attackers to spoof product updates.
Attacker Value
Unknown

CVE-2021-27569

Disclosure Date: May 07, 2021 (last updated February 22, 2025)
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
Attacker Value
Unknown

CVE-2021-27574

Disclosure Date: May 07, 2021 (last updated February 22, 2025)
An issue was discovered in Emote Remote Mouse through 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.
Attacker Value
Unknown

CVE-2021-31815

Disclosure Date: April 28, 2021 (last updated February 22, 2025)
GAEN (aka Google/Apple Exposure Notifications) through 2021-04-27 on Android allows attackers to obtain sensitive information, such as a user's location history, in-person social graph, and (sometimes) COVID-19 infection status, because Rolling Proximity Identifiers and MAC addresses are written to the Android system log, and many Android devices have applications (preinstalled by the hardware manufacturer or network operator) that read system log data and send it to third parties. NOTE: a news outlet (The Markup) states that they received a vendor response indicating that fix deployment "began several weeks ago and will be complete in the coming days."
Attacker Value
Unknown

CVE-2021-31671

Disclosure Date: April 27, 2021 (last updated February 22, 2025)
pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the --schema-first and --schema-only options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.
Attacker Value
Unknown

CVE-2021-3494

Disclosure Date: April 26, 2021 (last updated February 22, 2025)
A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not check the SSL certificate, thus, an unauthenticated attacker can perform actions in FreeIPA if certain conditions are met. The highest threat from this flaw is to system confidentiality. This flaw affects Foreman versions before 2.5.0.