Vulnerabilities (CVE)

Filtered by CWE-319
Total 624 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-4667 1 Ibm 1 Urbancode Deploy 2021-07-21 4.3 MEDIUM 5.9 MEDIUM
IBM UrbanCode Deploy (UCD) 7.0.5.2 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 171249.
CVE-2019-16063 1 Netsas 1 Enigma Network Management Solution 2021-07-21 5.0 MEDIUM 7.5 HIGH
NETSAS Enigma NMS 65.0.0 and prior does not encrypt sensitive data rendered within web pages. It is possible for an attacker to expose unencrypted sensitive data.
CVE-2020-15062 1 Digitus 2 Da-70254, Da-70254 Firmware 2021-07-21 3.3 LOW 8.8 HIGH
DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
CVE-2020-1343 1 Microsoft 1 Visual Studio Live Share 2021-07-21 5.0 MEDIUM 5.9 MEDIUM
An information disclosure vulnerability exists in Visual Studio Code Live Share Extension when it exposes tokens in plain text, aka 'Visual Studio Code Live Share Information Disclosure Vulnerability'.
CVE-2019-9860 1 Abus 6 Secvest Wireless Alarm System Fuaa50000, Secvest Wireless Alarm System Fuaa50000 Firmware, Secvest Wireless Remote Control Fube50014 and 3 more 2021-07-21 5.0 MEDIUM 7.5 HIGH
Due to unencrypted signal communication and predictability of rolling codes, an attacker can "desynchronize" an ABUS Secvest wireless remote control (FUBE50014 or FUBE50015) relative to its controlled Secvest wireless alarm system FUAA50000 3.01.01, so that sent commands by the remote control are not accepted anymore.
CVE-2021-32612 1 I-doo 1 Veryfitpro 2021-07-12 4.3 MEDIUM 8.1 HIGH
The VeryFitPro (com.veryfit2hr.second) application 3.2.8 for Android does all communication with the backend API over cleartext HTTP. This includes logins, registrations, and password change requests. This allows information theft and account takeover via network sniffing.
CVE-2021-22380 1 Huawei 1 Emui 2021-07-06 6.4 MEDIUM 9.1 CRITICAL
There is a Cleartext Transmission of Sensitive Information Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality and availability.
CVE-2021-23846 1 Bosch 2 B426, B426 Firmware 2021-06-24 4.3 MEDIUM 5.9 MEDIUM
When using http protocol, the user password is transmitted as a clear text parameter for which it is possible to be obtained by an attacker through a MITM attack. This will be fixed starting from Firmware version 3.11.5, which will be released on the 30th of June, 2021.
CVE-2019-19889 1 Humaxdigital 2 Hgb10r-02, Hgb10r-02 Firmware 2021-06-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered on Humax Wireless Voice Gateway HGB10R-2 20160817_1855 devices. The attacker can discover admin credentials in the backup file, aka backupsettings.conf.
CVE-2021-23018 1 F5 1 Nginx Controller 2021-06-11 5.8 MEDIUM 7.4 HIGH
Intra-cluster communication does not use TLS. The services within the NGINX Controller 3.x before 3.4.0 namespace are using cleartext protocols inside the cluster.
CVE-2021-33408 1 Abinitio 1 Control\>center 2021-06-08 4.0 MEDIUM 6.5 MEDIUM
Local File Inclusion vulnerability in Ab Initio Control>Center before 4.0.2.6 allows remote attackers to retrieve arbitrary files. Fixed in v4.0.2.6 and v4.0.3.1.
CVE-2021-27924 1 Couchbase 1 Couchbase Server 2021-05-26 4.3 MEDIUM 5.9 MEDIUM
An issue was discovered in Couchbase Server 6.x through 6.6.1. The Couchbase Server UI is insecurely logging session cookies in the logs. This allows for the impersonation of a user if the log files are obtained by an attacker before a session cookie expires.
CVE-2021-3003 1 Agenziaentrate 1 Desktop Telematico 2021-05-19 4.3 MEDIUM 5.3 MEDIUM
Agenzia delle Entrate Desktop Telematico 1.0.0 contacts the jws.agenziaentrate.it server over cleartext HTTP, which allows man-in-the-middle attackers to spoof product updates.
CVE-2018-8929 1 Synology 1 Ssl Vpn Client 2021-05-12 6.8 MEDIUM 8.1 HIGH
Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attacks via a crafted payload.
CVE-2021-31815 1 Google 1 Google\/apple Exposure Notifications 2021-05-07 2.1 LOW 3.3 LOW
GAEN (aka Google/Apple Exposure Notifications) through 2021-04-27 on Android allows attackers to obtain sensitive information, such as a user's location history, in-person social graph, and (sometimes) COVID-19 infection status, because Rolling Proximity Identifiers and MAC addresses are written to the Android system log, and many Android devices have applications (preinstalled by the hardware manufacturer or network operator) that read system log data and send it to third parties. NOTE: a news outlet (The Markup) states that they received a vendor response indicating that fix deployment "began several weeks ago and will be complete in the coming days."
CVE-2021-3494 1 Theforeman 1 Foreman 2021-05-04 4.3 MEDIUM 5.9 MEDIUM
A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not check the SSL certificate, thus, an unauthenticated attacker can perform actions in FreeIPA if certain conditions are met. The highest threat from this flaw is to system confidentiality. This flaw affects Foreman versions before 2.5.0.
CVE-2021-31671 1 Pgsync Project 1 Pgsync 2021-05-04 5.0 MEDIUM 7.5 HIGH
pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the --schema-first and --schema-only options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.
CVE-2021-27251 1 Netgear 84 Br200, Br200 Firmware, Br500 and 81 more 2021-04-27 8.3 HIGH 8.8 HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R7800. Authentication is not required to exploit this vulnerability The specific flaw exists within handling of firmware updates. The issue results from a fallback to a insecure protocol to deliver updates. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12308.
CVE-2021-3473 1 Lenovo 38 Thinkagile Hx1320, Thinkagile Hx2320, Thinkagile Hx3320 and 35 more 2021-04-23 4.0 MEDIUM 4.9 MEDIUM
An internal product security audit of Lenovo XClarity Controller (XCC) discovered that the XCC configuration backup/restore password may be written to an internal XCC log buffer if Lenovo XClarity Administrator (LXCA) is used to perform the backup/restore. The backup/restore password typically exists in this internal log buffer for less than 10 minutes before being overwritten. Generating an FFDC service log will include the log buffer contents, including the backup/restore password if present. The FFDC service log is only generated when requested by a privileged XCC user and it is only accessible to the privileged XCC user that requested the file. The backup/restore password is not captured if the backup/restore is initiated directly from XCC.
CVE-2021-20992 1 Fibaro 4 Home Center 2, Home Center 2 Firmware, Home Center Lite and 1 more 2021-04-23 5.0 MEDIUM 7.5 HIGH
In Fibaro Home Center 2 and Lite devices in all versions provide a web based management interface over unencrypted HTTP protocol. Communication between the user and the device can be eavesdropped to hijack sessions, tokens and passwords.