

This leads to admin session crafting and therefore gaining full web UI admin privileges by an unauthenticated attacker. Polycom VVX 400/410 version 5.3.1 allows low-privileged users to change the Admin account password by modifying a POST parameter name during the password reset process.Ĭertain NETGEAR smart switches are affected by a \n injection in the web UI's password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the "2" string). The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication. In Gradle Enterprise before 2021.1.3, an attacker with the ability to perform SSRF attacks can potentially reset the system user password. (1Password must be unlocked for these items to be accessible, but no further user interaction is required.) These items are usernames and passwords for vault items associated with its domain, usernames and passwords without a domain association, credit cards, and contact items. By targeting a vulnerable component of this extension, a malicious web page could read a subset of 1Password vault items that would normally be fillable by the user on that web page.
#Enphase sinvr for mac
The Safari app extension bundled with 1Password for Mac 7.7.0 through 7.8.x before 7.8.7 is vulnerable to authorization bypass. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password. GNU Mailman before 2.1.35 may allow remote Privilege Escalation. After obtaining a user’s permission, remote attackers can access other users’ and administrator’s account information except password by crafting URL parameters. The learning history page of the Easytest is vulnerable by permission bypass. The affected product is vulnerable to a disclosure of peer username and password by allowing all users access to read global variables.
