Show filters
86 Total Results
Displaying 21-30 of 86
Sort by:
Attacker Value
Unknown

CVE-2021-27450

Disclosure Date: March 25, 2021 (last updated February 22, 2025)
SSH server configuration file does not implement some best practices. This could lead to a weakening of the SSH protocol strength, which could lead to additional misconfiguration or be leveraged as part of a larger attack on the MU320E (all firmware versions prior to v04A00.1).
Attacker Value
Unknown

CVE-2021-21387

Disclosure Date: March 19, 2021 (last updated February 22, 2025)
Wrongthink peer-to-peer, end-to-end encrypted messenger with PeerJS and Axolotl ratchet. In wrongthink from version 2.0.0 and before 2.3.0 there was a set of vulnerabilities causing inadequate encryption strength. Part of the secret identity key was disclosed by the fingerprint used for connection. Additionally, the safety number was improperly calculated. It was computed using part of one of the public identity keys instead of being derived from both public identity keys. This caused issues in computing safety numbers which would potentially be exploitable in the real world. Additionally there was inadequate encryption strength due to use of 1024-bit DSA keys. These issues are all fixed in version 2.3.0.
Attacker Value
Unknown

CVE-2020-35221

Disclosure Date: March 10, 2021 (last updated February 22, 2025)
The hashing algorithm implemented for NSDP password authentication on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices was found to be insecure, allowing attackers (with access to a network capture) to quickly generate multiple collisions to generate valid passwords, or infer some parts of the original.
Attacker Value
Unknown

CVE-2021-20406

Disclosure Date: February 11, 2021 (last updated February 22, 2025)
IBM Security Verify Information Queue 1.0.6 and 1.0.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 196184.
Attacker Value
Unknown

CVE-2021-21474

Disclosure Date: February 09, 2021 (last updated February 22, 2025)
SAP HANA Database, versions - 1.0, 2.0, accepts SAML tokens with MD5 digest, an attacker who manages to obtain an MD5-digest signed SAML Assertion issued for an SAP HANA instance might be able to tamper with it and alter it in a way that the digest continues to be the same and without invalidating the digital signature, this allows them to impersonate as user in HANA database and be able to read the contents in the database.
Attacker Value
Unknown

CVE-2020-10554

Disclosure Date: February 05, 2021 (last updated February 22, 2025)
An issue was discovered in Psyprax beforee 3.2.2. Passwords used to encrypt the data are stored in the database in an obfuscated format, which can be easily reverted. For example, the password AAAAAAAA is stored in the database as MMMMMMMM.
Attacker Value
Unknown

CVE-2020-10375

Disclosure Date: February 05, 2021 (last updated February 22, 2025)
An issue was discovered in New Media Smarty before 9.10. Passwords are stored in the database in an obfuscated format that can be easily reversed. The file data.mdb contains these obfuscated passwords in the second column. NOTE: this is unrelated to the popular Smarty template engine product.
Attacker Value
Unknown

CVE-2021-25761

Disclosure Date: February 03, 2021 (last updated February 22, 2025)
In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible.
Attacker Value
Unknown

CVE-2020-25685

Disclosure Date: January 20, 2021 (last updated February 22, 2025)
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
Attacker Value
Unknown

CVE-2021-3131

Disclosure Date: January 13, 2021 (last updated February 22, 2025)
The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded credentials in the creds URL parameter.