Show filters
144 Total Results
Displaying 41-50 of 144
Sort by:
Attacker Value
Unknown

CVE-2020-14967

Disclosure Date: June 22, 2020 (last updated February 21, 2025)
An issue was discovered in the jsrsasign package before 8.0.18 for Node.js. Its RSA PKCS1 v1.5 decryption implementation does not detect ciphertext modification by prepending '\0' bytes to ciphertexts (it decrypts modified ciphertexts without error). An attacker might prepend these bytes with the goal of triggering memory corruption issues.
Attacker Value
Unknown

CVE-2020-14966

Disclosure Date: June 22, 2020 (last updated February 21, 2025)
An issue was discovered in the jsrsasign package through 8.0.18 for Node.js. It allows a malleability in ECDSA signatures by not checking overflows in the length of a sequence and '0' characters appended or prepended to an integer. The modified signatures are verified as valid. This could have a security-relevant impact if an application relied on a single canonical signature.
Attacker Value
Unknown

CVE-2020-14968

Disclosure Date: June 22, 2020 (last updated February 21, 2025)
An issue was discovered in the jsrsasign package before 8.0.17 for Node.js. Its RSASSA-PSS (RSA-PSS) implementation does not detect signature manipulation/modification by prepending '\0' bytes to a signature (it accepts these modified signatures as valid). An attacker can abuse this behavior in an application by creating multiple valid signatures where only one signature should exist. Also, an attacker might prepend these bytes with the goal of triggering memory corruption issues.
Attacker Value
Unknown

CVE-2019-16072

Disclosure Date: March 20, 2020 (last updated February 21, 2025)
An OS command injection vulnerability in the discover_and_manage CGI script in NETSAS Enigma NMS 65.0.0 and prior allows an attacker to execute arbitrary code because of improper neutralization of shell metacharacters in the ip_address variable within an snmp_browser action.
Attacker Value
Unknown

CVE-2019-16071

Disclosure Date: March 20, 2020 (last updated February 21, 2025)
Enigma NMS 65.0.0 and prior allows administrative users to create low-privileged accounts that do not have the ability to modify any settings in the system, only view the components. However, it is possible for a low-privileged user to perform all actions as an administrator by bypassing authorization controls and sending requests to the server in the context of an administrator.
Attacker Value
Unknown

CVE-2019-16069

Disclosure Date: March 19, 2020 (last updated February 21, 2025)
A number of stored Cross-site Scripting (XSS) vulnerabilities were identified in NETSAS Enigma NMS 65.0.0 and prior that could allow a threat actor to inject malicious code directly into the application through the SNMP protocol.
Attacker Value
Unknown

CVE-2019-16063

Disclosure Date: March 19, 2020 (last updated February 21, 2025)
NETSAS Enigma NMS 65.0.0 and prior does not encrypt sensitive data rendered within web pages. It is possible for an attacker to expose unencrypted sensitive data.
Attacker Value
Unknown

CVE-2019-16068

Disclosure Date: March 19, 2020 (last updated February 21, 2025)
A CSRF vulnerability exists in NETSAS ENIGMA NMS version 65.0.0 and prior that could allow an attacker to be able to trick a victim into submitting a malicious manage_files.cgi request. This can be triggered via XSS or an IFRAME tag included within the site.
Attacker Value
Unknown

CVE-2019-16067

Disclosure Date: March 19, 2020 (last updated February 21, 2025)
NETSAS Enigma NMS 65.0.0 and prior utilises basic authentication over HTTP for enforcing access control to the web application. The use of weak authentication transmitted over cleartext protocols can allow an attacker to steal username and password combinations by intercepting authentication traffic in transit.
Attacker Value
Unknown

CVE-2019-16061

Disclosure Date: March 19, 2020 (last updated February 21, 2025)
A number of files on the NETSAS Enigma NMS server 65.0.0 and prior are granted weak world-readable and world-writable permissions, allowing any low privileged user with access to the system to read sensitive data (e.g., .htpasswd) and create/modify/delete content (e.g., under /var/www/html/docs) within the operating system.