Show filters
348 Total Results
Displaying 51-60 of 348
Sort by:
Attacker Value
Unknown
CVE-2020-23036
Disclosure Date: October 22, 2021 (last updated February 23, 2025)
MEDIA NAVI Inc SMACom v1.2 was discovered to contain an insecure session validation vulnerability in the session handling of the `password` authentication parameter of the wifi photo transfer module. This vulnerability allows attackers with network access privileges or on public wifi networks to read the authentication credentials and follow-up requests containing the user password via a man in the middle attack.
0
Attacker Value
Unknown
CVE-2021-28496
Disclosure Date: October 19, 2021 (last updated February 23, 2025)
On systems running Arista EOS and CloudEOS with the affected release version, when using shared secret profiles the password configured for use by BiDirectional Forwarding Detection (BFD) will be leaked when displaying output over eAPI or other JSON outputs to other authenticated users on the device. The affected EOS Versions are: all releases in 4.22.x train, 4.23.9 and below releases in the 4.23.x train, 4.24.7 and below releases in the 4.24.x train, 4.25.4 and below releases in the 4.25.x train, 4.26.1 and below releases in the 4.26.x train
0
Attacker Value
Unknown
CVE-2021-40476
Disclosure Date: October 13, 2021 (last updated February 23, 2025)
Windows AppContainer Elevation Of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2021-41125
Disclosure Date: October 06, 2021 (last updated February 23, 2025)
Scrapy is a high-level web crawling and scraping framework for Python. If you use `HttpAuthMiddleware` (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the `w3lib.http.basic_auth_header` function to convert your credentials into a value that you can assign to the `Authorization` header of yo…
0
Attacker Value
Unknown
CVE-2021-36170
Disclosure Date: October 06, 2021 (last updated February 23, 2025)
An information disclosure vulnerability [CWE-200] in FortiAnalyzerVM and FortiManagerVM versions 7.0.0 and 6.4.6 and below may allow an authenticated attacker to read the FortiCloud credentials which were used to activate the trial license in cleartext.
0
Attacker Value
Unknown
CVE-2021-36178
Disclosure Date: October 06, 2021 (last updated February 23, 2025)
A insufficiently protected credentials in Fortinet FortiSDNConnector version 1.1.7 and below allows attacker to disclose third-party devices credential information via configuration page lookup.
0
Attacker Value
Unknown
CVE-2021-41092
Disclosure Date: October 04, 2021 (last updated February 23, 2025)
Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.
0
Attacker Value
Unknown
CVE-2021-41297
Disclosure Date: September 30, 2021 (last updated February 23, 2025)
ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated user to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text.
0
Attacker Value
Unknown
CVE-2021-41300
Disclosure Date: September 30, 2021 (last updated February 23, 2025)
ECOA BAS controller’s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality.
0
Attacker Value
Unknown
CVE-2021-39342
Disclosure Date: September 29, 2021 (last updated February 23, 2025)
The Credova_Financial WordPress plugin discloses a site's associated Credova API account username and password in plaintext via an AJAX action whenever a site user goes to checkout on a page that has the Credova Financing option enabled. This affects versions up to, and including, 1.4.8.
0