Show filters
176 Total Results
Displaying 131-140 of 176
Sort by:
Attacker Value
Unknown

CVE-2019-20028

Disclosure Date: July 29, 2020 (last updated November 28, 2024)
Aspire-derived NEC PBXes operating InMail software, including all versions of SV8100, SV9100, SL1100 and SL2100 devices allow unauthenticated read-only access to voicemails, greetings, and voice response system content through a system's WebPro administration interface.
Attacker Value
Unknown

CVE-2019-20027

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
Aspire-derived NEC PBXes, including the SV8100, SV9100, SL1100 and SL2100 with software releases 7.0 or higher contain the possibility if incorrectly configured to allow a blank username and password combination to be entered as a valid, successfully authenticating account.
Attacker Value
Unknown

CVE-2019-18618

Disclosure Date: July 22, 2020 (last updated November 28, 2024)
Incorrect access control in the firmware of Synaptics VFS75xx family fingerprint sensors that include external flash (all versions prior to 2019-11-15) allows a local administrator or physical attacker to compromise the confidentiality of sensor data via injection of an unverified partition table.
Attacker Value
Unknown

CVE-2019-20679

Disclosure Date: April 15, 2020 (last updated November 27, 2024)
NETGEAR MR1100 devices before 12.06.08.00 are affected by lack of access control at the function level.
Attacker Value
Unknown

CVE-2019-20638

Disclosure Date: April 15, 2020 (last updated February 21, 2025)
NETGEAR MR1100 devices before 12.06.08.00 are affected by disclosure of administrative credentials.
Attacker Value
Unknown

CVE-2019-20649

Disclosure Date: April 15, 2020 (last updated November 27, 2024)
NETGEAR MR1100 devices before 12.06.08.00 are affected by disclosure of sensitive information.
Attacker Value
Unknown

CVE-2020-6980

Disclosure Date: March 16, 2020 (last updated February 21, 2025)
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, If Simple Mail Transfer Protocol (SMTP) account data is saved in RSLogix 500, a local attacker with access to a victim’s project may be able to gather SMTP server authentication data as it is written to the project file in cleartext.
Attacker Value
Unknown

CVE-2020-6988

Disclosure Date: March 16, 2020 (last updated February 21, 2025)
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials.
Attacker Value
Unknown

CVE-2020-6984

Disclosure Date: March 16, 2020 (last updated February 21, 2025)
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic function utilized to protect the password in MicroLogix is discoverable.
Attacker Value
Unknown

CVE-2020-6990

Disclosure Date: March 16, 2020 (last updated February 21, 2025)
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic key utilized to help protect the account password is hard coded into the RSLogix 500 binary file. An attacker could identify cryptographic keys and use it for further cryptographic attacks that could ultimately lead to a remote attacker gaining unauthorized access to the controller.