CVE-2022-20651 : CISCO ADAPTIVE SECURITY DEVICE MANAGER LOG FILE

Description

A vulnerability in the logging component of Cisco Adaptive Security Device Manager (ASDM) could allow an authenticated, local attacker to view sensitive information in clear text on an affected system. Cisco ADSM must be deployed in a shared workstation environment for this issue to be exploited. This vulnerability is due to the storage of unencrypted credentials in certain logs. An attacker could exploit this vulnerability by accessing the logs on an affected system. A successful exploit could allow the attacker to view the credentials of other users of the shared device.

References

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asdm-logging-jnLOY422

For More Information

MITRE

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2022-32532 : APACHE SHIRO UP TO 1.9.0 REGEXREQUESTMATCHER AUTHORIZATION

CVE-2022-32532 : APACHE SHIRO UP TO 1.9.0 REGEXREQUESTMATCHER AUTHORIZATION

Description Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher

CVE-2022-31104 : WASMTIME CALCULATION

CVE-2022-31104 : WASMTIME CALCULATION

Description Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime’s implementation of the SIMD proposal for WebAssembly on

CVE-2022-33146 : WEB2PY UP TO 2.22.4 URL REDIRECT

CVE-2022-33146 : WEB2PY UP TO 2.22.4 URL REDIRECT

Description Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an