Show filters
75 Total Results
Displaying 51-60 of 75
Sort by:
Attacker Value
Unknown
CVE-2018-7244
Disclosure Date: April 18, 2018 (last updated November 26, 2024)
An information disclosure vulnerability exists In Schneider Electric's 66074 MGE Network Management Card Transverse installed in MGE UPS and MGE STS. The integrated web server (Port 80/443/TCP) of the affected devices could allow a remote attacker to obtain sensitive device information if network access was obtained.
0
Attacker Value
Unknown
CVE-2018-7245
Disclosure Date: April 18, 2018 (last updated November 26, 2024)
An improper authorization vulnerability exists In Schneider Electric's 66074 MGE Network Management Card Transverse installed in MGE UPS and MGE STS. The integrated web server (Port 80/443/TCP) of the affected devices could allow a remote attacker to change UPS control and shutdown parameters or other critical settings without authorization.
0
Attacker Value
Unknown
CVE-2018-7246
Disclosure Date: April 18, 2018 (last updated November 26, 2024)
A cleartext transmission of sensitive information vulnerability exists in Schneider Electric's 66074 MGE Network Management Card Transverse installed in MGE UPS and MGE STS. he integrated web server (Port 80/443/TCP) of the affected devices could allow remote attackers to discover an administrative account. If default on device, it is not using a SSL in settings and if multiple request of the page "Access Control" (IP-address device/ups/pas_cont.htm) account data will be sent in cleartext
0
Attacker Value
Unknown
CVE-2018-1000150
Disclosure Date: April 05, 2018 (last updated November 26, 2024)
An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in users.
0
Attacker Value
Unknown
CVE-2018-6591
Disclosure Date: February 19, 2018 (last updated November 26, 2024)
Converse.js and Inverse.js through 3.3 allow remote attackers to obtain sensitive information because it is too difficult to determine whether safe publication of private data was configured or even intended. For example, users might have an expectation that chatroom bookmarks are private, but the various interacting software components do not necessarily make that happen.
0
Attacker Value
Unknown
CVE-2018-6579
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
SQL Injection exists in the JEXTN Reverse Auction 3.1.0 component for Joomla! via a view=products&uid= request.
0
Attacker Value
Unknown
CVE-2017-14116
Disclosure Date: September 03, 2017 (last updated November 26, 2024)
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG599 device, when IP Passthrough mode is not used, configures WAN access to a caserver https service with the tech account and an empty password, which allows remote attackers to obtain root privileges by establishing a session on port 49955 and then installing new software, such as BusyBox with "nc -l" support.
0
Attacker Value
Unknown
CVE-2017-10793
Disclosure Date: September 03, 2017 (last updated November 26, 2024)
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589, NVG599, and unspecified other devices, when IP Passthrough mode is not used, configures an sbdc.ha WAN TCP service on port 61001 with the bdctest account and the bdctest password, which allows remote attackers to obtain sensitive information (such as the Wi-Fi password) by leveraging knowledge of a hardware identifier, related to the Bulk Data Collection (BDC) mechanism defined in Broadband Forum technical reports.
0
Attacker Value
Unknown
CVE-2017-14117
Disclosure Date: September 03, 2017 (last updated November 26, 2024)
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures an unauthenticated proxy service on WAN TCP port 49152, which allows remote attackers to establish arbitrary TCP connections to intranet hosts by sending \x2a\xce\x01 followed by other predictable values.
0
Attacker Value
Unknown
CVE-2017-14115
Disclosure Date: September 03, 2017 (last updated November 26, 2024)
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures ssh-permanent-enable WAN SSH logins to the remotessh account with the 5SaP9I26 password, which allows remote attackers to access a "Terminal shell v1.0" service, and subsequently obtain unrestricted root privileges, by establishing an SSH session and then entering certain shell metacharacters and BusyBox commands.
0