Show filters
75 Total Results
Displaying 41-50 of 75
Sort by:
Attacker Value
Unknown
CVE-2022-24880
Disclosure Date: April 25, 2022 (last updated October 07, 2023)
flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. In versions prior to 1.2.1, he `captcha.validate()` function would return `None` if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Version 1.2.1 fixes the issue. Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work.
0
Attacker Value
Unknown
CVE-2022-25251
Disclosure Date: March 08, 2022 (last updated October 07, 2023)
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) may allow an attacker to send certain XML messages to a specific port without proper authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to read and modify the affected product’s configuration.
0
Attacker Value
Unknown
CVE-2022-25248
Disclosure Date: March 08, 2022 (last updated October 07, 2023)
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) supplies the event log of the specific service.
0
Attacker Value
Unknown
CVE-2022-25252
Disclosure Date: March 08, 2022 (last updated October 07, 2023)
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) when receiving certain input throws an exception. Services using said function do not handle the exception. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to crash the affected product.
0
Attacker Value
Unknown
CVE-2022-25250
Disclosure Date: March 08, 2022 (last updated October 07, 2023)
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) may allow an attacker to send a certain command to a specific port without authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to shut down a specific service.
0
Attacker Value
Unknown
CVE-2022-25246
Disclosure Date: March 08, 2022 (last updated October 07, 2023)
Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) uses hard-coded credentials for its UltraVNC installation. Successful exploitation of this vulnerability could allow a remote authenticated attacker to take full remote control of the host operating system.
0
Attacker Value
Unknown
CVE-2022-25249
Disclosure Date: March 08, 2022 (last updated October 07, 2023)
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) (disregarding Axeda agent v6.9.2 and v6.9.3) is vulnerable to directory traversal, which could allow a remote unauthenticated attacker to obtain file system read access via web server..
0
Attacker Value
Unknown
CVE-2022-25247
Disclosure Date: March 08, 2022 (last updated October 07, 2023)
Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) may allow an attacker to send certain commands to a specific port without authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to obtain full file-system access and remote code execution.
0
Attacker Value
Unknown
CVE-2021-42358
Disclosure Date: November 29, 2021 (last updated February 23, 2025)
The Contact Form With Captcha WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation in the ~/cfwc-form.php file during contact form submission, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.6.2.
0
Attacker Value
Unknown
CVE-2021-35296
Disclosure Date: October 04, 2021 (last updated February 23, 2025)
An issue in the administrator authentication panel of PTCL HG150-Ub v3.0 allows attackers to bypass authentication via modification of the cookie value and Response Path.
0