Show filters
1,326 Total Results
Displaying 221-230 of 1,326
Sort by:
Attacker Value
Unknown

CVE-2022-24801

Disclosure Date: April 04, 2022 (last updated February 23, 2025)
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to version 22.4.0rc1, the Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230. This non-conformant parsing can lead to desync if requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling. Users who may be affected use Twisted Web's HTTP 1.1 server and/or proxy and also pass requests through a different HTTP server and/or proxy. The Twisted Web client is not affected. The HTTP 2.0 server uses a different parser, so it is not affected. The issue has been addressed in Twisted 22.4.0rc1. Two workarounds are available: Ensure any vulnerabilities in upstream proxies have been addressed, such as by upgrading them; or filter malformed requests by other means, such as configuration of an upstream proxy.
Attacker Value
Unknown

CVE-2022-22356

Disclosure Date: April 04, 2022 (last updated February 23, 2025)
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow an attacker to enumerate account credentials due to an observable discrepancy in valid and invalid login attempts. IBM X-Force ID: 220487.
Attacker Value
Unknown

CVE-2022-22355

Disclosure Date: April 04, 2022 (last updated October 07, 2023)
IBM MQ Appliance 9.2 CD and 9.2 LTS are vulnerable to a denial of service in the Login component of the application which could allow an attacker to cause a drop in performance.
Attacker Value
Unknown

CVE-2021-30066

Disclosure Date: April 03, 2022 (last updated February 23, 2025)
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an arbitrary firmware image can be loaded because firmware signature verification (for a USB stick) can be bypassed. NOTE: this issue exists because of an incomplete fix of CVE-2017-11400.
Attacker Value
Unknown

CVE-2021-30065

Disclosure Date: April 03, 2022 (last updated October 07, 2023)
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, crafted ModBus packets can bypass the ModBus enforcer. NOTE: this issue exists because of an incomplete fix of CVE-2017-11401.
Attacker Value
Unknown

CVE-2021-30064

Disclosure Date: April 03, 2022 (last updated February 23, 2025)
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an SSH login can succeed with hardcoded default credentials (if the device is in the uncommissioned state).
Attacker Value
Unknown

CVE-2021-30063

Disclosure Date: April 03, 2022 (last updated October 07, 2023)
On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Security Appliance, crafted OPC packets can cause an OPC enforcer denial of service.
Attacker Value
Unknown

CVE-2021-30062

Disclosure Date: April 03, 2022 (last updated October 07, 2023)
On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Security Appliance, crafted OPC packets can bypass the OPC enforcer.
Attacker Value
Unknown

CVE-2021-30061

Disclosure Date: April 03, 2022 (last updated October 07, 2023)
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, physically proximate attackers can execute code via a crafted file on a USB stick.
Attacker Value
Unknown

CVE-2022-22316

Disclosure Date: March 18, 2022 (last updated October 07, 2023)
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow an authenticated and authorized user to cause a denial of service due to incorrectly configured authorization checks. IBM X-Force ID: 218276.