Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2023-4299
Disclosure Date: August 31, 2023 (last updated October 08, 2023)
Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment.
0
Attacker Value
Unknown
CVE-2022-26953
Disclosure Date: April 06, 2022 (last updated February 23, 2025)
Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow. An attacker can supply a string in the page parameter for reboot.asp endpoint, allowing him to force an overflow when the string is concatenated to the HTML body.
0
Attacker Value
Unknown
CVE-2022-26952
Disclosure Date: April 06, 2022 (last updated February 23, 2025)
Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow in the function for building the Location header string when an unauthenticated user is redirected to the authentication page.
0
Attacker Value
Unknown
CVE-2021-35977
Disclosure Date: October 08, 2021 (last updated February 23, 2025)
An issue was discovered in Digi RealPort for Windows through 4.8.488.0. A buffer overflow exists in the handling of ADDP discovery response messages. This could result in arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-36767
Disclosure Date: October 08, 2021 (last updated February 23, 2025)
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
0
Attacker Value
Unknown
CVE-2021-35979
Disclosure Date: October 08, 2021 (last updated February 23, 2025)
An issue was discovered in Digi RealPort through 4.8.488.0. The 'encrypted' mode is vulnerable to man-in-the-middle attacks and does not perform authentication.
0
Attacker Value
Unknown
CVE-2019-7632
Disclosure Date: February 08, 2019 (last updated November 27, 2024)
LifeSize Team, Room, Passport, and Networker 220 devices allow Authenticated Remote OS Command Injection, as demonstrated by shell metacharacters in the support/mtusize.php mtu_size parameter. The lifesize default password for the cli account may sometimes be used for authentication.
0