Show filters
22 Total Results
Displaying 11-20 of 22
Sort by:
Attacker Value
Unknown
CVE-2022-26952
Disclosure Date: April 06, 2022 (last updated February 23, 2025)
Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow in the function for building the Location header string when an unauthenticated user is redirected to the authentication page.
0
Attacker Value
Unknown
CVE-2021-35977
Disclosure Date: October 08, 2021 (last updated February 23, 2025)
An issue was discovered in Digi RealPort for Windows through 4.8.488.0. A buffer overflow exists in the handling of ADDP discovery response messages. This could result in arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-36767
Disclosure Date: October 08, 2021 (last updated February 23, 2025)
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
0
Attacker Value
Unknown
CVE-2021-35979
Disclosure Date: October 08, 2021 (last updated February 23, 2025)
An issue was discovered in Digi RealPort through 4.8.488.0. The 'encrypted' mode is vulnerable to man-in-the-middle attacks and does not perform authentication.
0
Attacker Value
Unknown
CVE-2021-41580
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply receiving the access token (i.e., does not try to use the token). NOTE: the passport-oauth2 vendor does not consider this a passport-oauth2 vulnerability
0
Attacker Value
Unknown
CVE-2021-39171
Disclosure Date: August 27, 2021 (last updated February 23, 2025)
Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. Prior to version 3.1.0, a malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack. This has been resolved in version 3.1.0. The resolution is to limit the number of allowable transforms to 2.
0
Attacker Value
Unknown
CVE-2019-13483
Disclosure Date: July 25, 2019 (last updated November 27, 2024)
Auth0 Passport-SharePoint before 0.4.0 does not validate the JWT signature of an Access Token before processing. This allows attackers to forge tokens and bypass authentication and authorization mechanisms.
0
Attacker Value
Unknown
CVE-2018-17500
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
Envoy Passport for Android and Envoy Passport for iPhone could allow a local attacker to obtain sensitive information, caused by the storing of hardcoded OAuth Creds in plaintext. An attacker could exploit this vulnerability to obtain sensitive information.
0
Attacker Value
Unknown
CVE-2018-17499
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
Envoy Passport for Android and Envoy Passport for iPhone could allow a local attacker to obtain sensitive information, caused by the storing of unencrypted data in logs. An attacker could exploit this vulnerability to obtain two API keys, a token and other sensitive information.
0
Attacker Value
Unknown
CVE-2019-7632
Disclosure Date: February 08, 2019 (last updated November 27, 2024)
LifeSize Team, Room, Passport, and Networker 220 devices allow Authenticated Remote OS Command Injection, as demonstrated by shell metacharacters in the support/mtusize.php mtu_size parameter. The lifesize default password for the cli account may sometimes be used for authentication.
0