Show filters
144 Total Results
Displaying 101-110 of 144
Sort by:
Attacker Value
Unknown
CVE-2020-5763
Disclosure Date: July 29, 2020 (last updated February 21, 2025)
Grandstream HT800 series firmware version 1.0.17.5 and below contain a backdoor in the SSH service. An authenticated remote attacker can obtain a root shell by correctly answering a challenge prompt.
0
Attacker Value
Unknown
CVE-2020-10919
Disclosure Date: July 23, 2020 (last updated February 21, 2025)
This vulnerability allows remote attackers to disclose sensitive information on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. When transmitting passwords, the process encrypts them in a recoverable format. An attacker can leverage this vulnerability to disclose credentials, leading to further compromise. Was ZDI-CAN-10185.
0
Attacker Value
Unknown
CVE-2020-1982
Disclosure Date: July 08, 2020 (last updated February 21, 2025)
Certain communication between PAN-OS and cloud-delivered services inadvertently use TLS 1.0, which is known to be a cryptographically weak protocol. These cloud services include Cortex Data Lake, the Customer Support Portal, and the Prisma Access infrastructure. Conditions required for exploitation of known TLS 1.0 weaknesses do not exist for the communication between PAN-OS and cloud-delivered services. We do not believe that any communication is impacted as a result of known attacks against TLS 1.0. This issue impacts: All versions of PAN-OS 8.0; PAN-OS 8.1 versions earlier than PAN-OS 8.1.14; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3. PAN-OS 7.1 is not impacted by this issue.
0
Attacker Value
Unknown
CVE-2017-1712
Disclosure Date: July 01, 2020 (last updated February 21, 2025)
"A vulnerability in the TLS protocol implementation of the Domino server could allow an unauthenticated, remote attacker to access sensitive information, aka a Return of Bleichenbacher's Oracle Threat (ROBOT) attack. An attacker could iteratively query a server running a vulnerable TLS stack implementation to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions."
0
Attacker Value
Unknown
CVE-2020-14481
Disclosure Date: June 25, 2020 (last updated February 23, 2025)
The DeskLock tool provided with FactoryTalk View SE uses a weak encryption algorithm that may allow a local, authenticated attacker to decipher user credentials, including the Windows user or Windows DeskLock passwords. If the compromised user has an administrative account, an attacker could gain full access to the user’s operating system and certain components of FactoryTalk View SE.
0
Attacker Value
Unknown
CVE-2020-10275
Disclosure Date: June 24, 2020 (last updated February 21, 2025)
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
0
Attacker Value
Unknown
CVE-2020-0533
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access.
0
Attacker Value
Unknown
CVE-2020-3929
Disclosure Date: June 12, 2020 (last updated February 21, 2025)
GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS. Attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages.
0
Attacker Value
Unknown
CVE-2020-12714
Disclosure Date: June 11, 2020 (last updated February 21, 2025)
An issue was discovered in CipherMail Community Gateway Virtual Appliances and Professional/Enterprise Gateway Virtual Appliances versions 1.0.1 through 4.7.1-0 and CipherMail Webmail Messenger Virtual Appliances 1.1.1 through 3.1.1-0. A Diffie-Hellman parameter of insufficient size could allow man-in-the-middle compromise of communications between CipherMail products and external SMTP clients.
0
Attacker Value
Unknown
CVE-2020-13785
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
D-Link DIR-865L Ax 1.20B01 Beta devices have Inadequate Encryption Strength.
0