Show filters
251 Total Results
Displaying 71-80 of 251
Sort by:
Attacker Value
Unknown
CVE-2021-36165
Disclosure Date: September 28, 2021 (last updated February 23, 2025)
RICON Industrial Cellular Router S9922L 16.10.3(3794) is affected by cleartext storage of sensitive information and sends username and password as base64.
0
Attacker Value
Unknown
CVE-2021-40847
Disclosure Date: September 21, 2021 (last updated February 23, 2025)
The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. While the parental controls themselves are not enabled by default on the routers, the Circle update daemon, circled, is enabled by default. This daemon connects to Circle and NETGEAR to obtain version information and updates to the circled daemon and its filtering database. However, database updates from NETGEAR are unsigned and downloaded via cleartext HTTP. As such, an attacker with the ability to perform a MitM attack on the device can respond to circled update requests with a crafted, compressed database file, the extraction of which gives the attacker the ability to overwrite executable files with attacker-controlled code. This affects R6400v2 1.0.4.106, R6700 1.0.2.16, R6700v3 1.0.4.106, R6900 1.0.2.16, R6900P 1.3.2.134, R7000 1.0.11.123, R7000P 1.3.2.134, R7850 1.0.5.68, R7900 1.0.4.38, R8000 1.0.4.68, and RS400…
0
Attacker Value
Unknown
CVE-2021-38142
Disclosure Date: September 07, 2021 (last updated February 23, 2025)
Barco MirrorOp Windows Sender before 2.5.3.65 uses cleartext HTTP and thus allows rogue software upgrades. An attacker on the local network can achieve remote code execution on any computer that tries to update Windows Sender due to the fact that the upgrade mechanism is not secured (is not protected with TLS).
0
Attacker Value
Unknown
CVE-2021-39272
Disclosure Date: August 30, 2021 (last updated February 23, 2025)
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
0
Attacker Value
Unknown
CVE-2021-33883
Disclosure Date: August 25, 2021 (last updated February 23, 2025)
A Cleartext Transmission of Sensitive Information vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote attacker to obtain sensitive information by snooping on the network traffic. The exposed data includes critical values for a pump's internal configuration.
0
Attacker Value
Unknown
CVE-2021-38373
Disclosure Date: August 10, 2021 (last updated February 23, 2025)
In KDE KMail 19.12.3 (aka 5.13.3), the SMTP STARTTLS option is not honored (and cleartext messages are sent) unless "Server requires authentication" is checked.
0
Attacker Value
Unknown
CVE-2021-22923
Disclosure Date: August 05, 2021 (last updated February 23, 2025)
When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.
0
Attacker Value
Unknown
CVE-2021-33900
Disclosure Date: July 26, 2021 (last updated February 23, 2025)
While investigating DIRSTUDIO-1219 it was noticed that configured StartTLS encryption was not applied when any SASL authentication mechanism (DIGEST-MD5, GSSAPI) was used. While investigating DIRSTUDIO-1220 it was noticed that any configured SASL confidentiality layer was not applied. This issue affects Apache Directory Studio version 2.0.0.v20210213-M16 and prior versions.
0
Attacker Value
Unknown
CVE-2021-29769
Disclosure Date: July 23, 2021 (last updated February 23, 2025)
IBM i2 Analyst's Notebook Premium (IBM i2 Analyze 4.3.0, 4.3.1, and 4.3.2) does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 202769.
0
Attacker Value
Unknown
CVE-2020-36423
Disclosure Date: July 19, 2021 (last updated February 23, 2025)
An issue was discovered in Arm Mbed TLS before 2.23.0. A remote attacker can recover plaintext because a certain Lucky 13 countermeasure doesn't properly consider the case of a hardware accelerator.
0