Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2013-4454

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-18 Feb, 2020 | 13:23
Updated At-06 Aug, 2024 | 16:45
Rejected At-
Credits

WordPress Portable phpMyAdmin Plugin 1.4.1 has Multiple Security Bypass Vulnerabilities

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:18 Feb, 2020 | 13:23
Updated At:06 Aug, 2024 | 16:45
Rejected At:
▼CVE Numbering Authority (CNA)

WordPress Portable phpMyAdmin Plugin 1.4.1 has Multiple Security Bypass Vulnerabilities

Affected Products
Vendor
Portable phpMyAdmin Plugin authors
Product
Portable phpMyAdmin Plugin
Versions
Affected
  • 1.4.1
Problem Types
TypeCWE IDDescription
textN/ASecurity Bypass
Type: text
CWE ID: N/A
Description: Security Bypass
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/63249
x_refsource_MISC
http://www.openwall.com/lists/oss-security/2013/10/22/3
x_refsource_MISC
http://www.openwall.com/lists/oss-security/2013/10/22/9
x_refsource_MISC
http://www.openwall.com/lists/oss-security/2013/10/23/2
x_refsource_MISC
http://www.openwall.com/lists/oss-security/2013/10/23/9
x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/88184
x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/88189
x_refsource_MISC
Hyperlink: http://www.securityfocus.com/bid/63249
Resource:
x_refsource_MISC
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/22/3
Resource:
x_refsource_MISC
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/22/9
Resource:
x_refsource_MISC
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/23/2
Resource:
x_refsource_MISC
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/23/9
Resource:
x_refsource_MISC
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/88184
Resource:
x_refsource_MISC
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/88189
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/63249
x_refsource_MISC
x_transferred
http://www.openwall.com/lists/oss-security/2013/10/22/3
x_refsource_MISC
x_transferred
http://www.openwall.com/lists/oss-security/2013/10/22/9
x_refsource_MISC
x_transferred
http://www.openwall.com/lists/oss-security/2013/10/23/2
x_refsource_MISC
x_transferred
http://www.openwall.com/lists/oss-security/2013/10/23/9
x_refsource_MISC
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/88184
x_refsource_MISC
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/88189
x_refsource_MISC
x_transferred
Hyperlink: http://www.securityfocus.com/bid/63249
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/22/3
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/22/9
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/23/2
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/23/9
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/88184
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/88189
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:18 Feb, 2020 | 14:15
Updated At:21 Feb, 2020 | 14:58

WordPress Portable phpMyAdmin Plugin 1.4.1 has Multiple Security Bypass Vulnerabilities

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Primary2.06.4MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
Type: Primary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Type: Primary
Version: 2.0
Base score: 6.4
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N
CPE Matches

getbutterfly
getbutterfly
>>portable-phpmyadmin>>1.4.1
cpe:2.3:a:getbutterfly:portable-phpmyadmin:1.4.1:*:*:*:*:wordpress:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2013/10/22/3secalert@redhat.com
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2013/10/22/9secalert@redhat.com
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2013/10/23/2secalert@redhat.com
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2013/10/23/9secalert@redhat.com
Mailing List
Third Party Advisory
http://www.securityfocus.com/bid/63249secalert@redhat.com
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/88184secalert@redhat.com
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/88189secalert@redhat.com
Third Party Advisory
VDB Entry
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/22/3
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/22/9
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/23/2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2013/10/23/9
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/63249
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/88184
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/88189
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry

Change History

0
Information is not available yet

Similar CVEs

156Records found

CVE-2023-5376
Matching Score-4
Assigner-CyberDanube
ShareView Details
Matching Score-4
Assigner-CyberDanube
CVSS Score-8.6||HIGH
EPSS-0.35% / 56.42%
||
7 Day CHG~0.00%
Published-09 Jan, 2024 | 09:44
Updated-13 Feb, 2025 | 17:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TFTP Without Authentication

An Improper Authentication vulnerability in Korenix JetNet TFTP allows abuse of this service. This issue affects JetNet devices older than firmware version 2024/01.

Action-Not Available
Vendor-korenixKorenix
Product-jetnet_6728g-24p-ac-2dc-usjetnet_6828gf-ac-usjetnet_4508if-sw_firmwarejetnet_4508i-w_firmwarejetnet_7714g-m12_hvdc_firmwarejetnet_7628x-4f-eu_firmwarejetnet_4508i-wjetnet_6828gf-2dc24_firmwarejetnet_4508jetnet_4508-w_firmwarejetnet_5612g-4f_firmwarejetnet_4508f-mwjetnet_7628x-4f-eujetnet_4508f-mjetnet_7628x-4f-us_firmwarejetnet_6828gf-2dc48jetnet_6828gf-2ac-aujetnet_4508f-swjetnet_6528gf-2dc48jetnet_6728g-24p-ac-2dc-eu_firmwarejetnet_4508if-m_firmwarejetnet_4508f-mw_firmwarejetnet_7310g-v2_firmwarejetnet_6628xp-4f-us_firmwarejetnet_6828gf-ac-us_firmwarejetnet_6528gf-ac-eu_firmwarejetnet_4508-wjetnet_6728g-24p-ac-2dc-eujetnet_6528gf-ac-us_firmwarejetnet_6910g-m12_hvdcjetnet_7628x-4f-usjetnet_5728g-24p-ac-2dc-eujetnet_6528gf-2ac-eujetnet_4508if-mw_firmwarejetnet_6828gf-2ac-usjetnet_5728g-24p-ac-2dc-eu_firmwarejetnet_6528gf-2ac-usjetnet_7628xp-4f-eu_firmwarejetnet_6828gf-ac-dc24-eujetnet_6528gf-ac-eujetnet_6528gf-2ac-eu_firmwarejetnet_7628xp-4f-us_firmwarejetnet_6828gf-2ac-au_firmwarejetnet_6828gf-ac-dc24-usjetnet_5612gp-4fjetnet_4508if-mwjetnet_6828gf-2dc48_firmwarejetnet_5310gjetnet_4508if-swjetnet_5728g-24p-ac-2dc-usjetnet_6828gf-ac-dc24-eu_firmwarejetnet_4508f-sjetnet_5310g_firmwarejetnet_4508if-sjetnet_6828gf-2ac-us_firmwarejetnet_6628x-4f-eu_firmwarejetnet_7628xp-4f-eujetnet_4508f-s_firmwarejetnet_6528gf-2dc24_firmwarejetnet_6828gf-2ac-eu_firmwarejetnet_6828gf-2ac-eujetnet_5728g-24p-ac-2dc-us_firmwarejetnet_7310g-v2jetnet_4508if-s_firmwarejetnet_4508_firmwarejetnet_6628xp-4f-usjetnet_6728g-24p-ac-2dc-us_firmwarejetnet_4508f-sw_firmwarejetnet_6528gf-ac-usjetnet_6528gf-2dc24jetnet_4508f-m_firmwarejetnet_5612g-4fjetnet_6828gf-ac-dc24-us_firmwarejetnet_6528gf-2dc48_firmwarejetnet_5612gp-4f_firmwarejetnet_6828gf-2dc24jetnet_6910g-m12_hvdc_firmwarejetnet_4508if-mjetnet_7714g-m12_hvdcjetnet_6628x-4f-eujetnet_6528gf-2ac-us_firmwarejetnet_5620g-4cjetnet_5620g-4c_firmwarejetnet_7628xp-4f-usJetNet Series
CWE ID-CWE-287
Improper Authentication
CVE-2008-0408
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.59% / 68.34%
||
7 Day CHG~0.00%
Published-28 Jan, 2008 | 23:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HTTP File Server (HFS) before 2.2c allows remote attackers to append arbitrary text to the log file by using the base64 representation of this text during HTTP Basic Authentication.

Action-Not Available
Vendor-hfsn/a
Product-http_file_servern/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-2638
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.50% / 64.73%
||
7 Day CHG~0.00%
Published-16 Jul, 2018 | 13:00
Updated-05 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.

Action-Not Available
Vendor-infinispan[UNKNOWN]Red Hat, Inc.
Product-jboss_data_gridinfinispaninfinispan
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-287
Improper Authentication
CVE-2007-5855
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.41% / 60.80%
||
7 Day CHG~0.00%
Published-19 Dec, 2007 | 21:00
Updated-07 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mail in Apple Mac OS X 10.4.11 and 10.5.1, when an SMTP account has been set up using Account Assistant, can use plaintext authentication even when MD5 Challenge-Response authentication is available, which makes it easier for remote attackers to sniff account activity.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xn/a
CWE ID-CWE-287
Improper Authentication
CVE-2015-0670
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.53% / 66.33%
||
7 Day CHG~0.00%
Published-21 Mar, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The default configuration of Cisco Small Business IP phones SPA 300 7.5.5 and SPA 500 7.5.5 does not properly support authentication, which allows remote attackers to read audio-stream data or originate telephone calls via a crafted XML request, aka Bug ID CSCuo52482.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-spa_508g_8-line_ip_phonespa_525g2_5-line_ip_phonespa_509g_12-line_ip_phonespa500_firmwarespa_525g_5-line_ip_phonespa_512g_1-line_ip_phonespa_301_1_line_ip_phonespa_302dkitspa_514g_4-line_ip_phonespa_502g_1-line_ip_phonespa_504g_4-line_ip_phonespa_303_3_line_ip_phonespa300_firmwarespa_501g_8-line_ip_phonespa_302dn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-47408
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.07% / 21.87%
||
7 Day CHG~0.00%
Published-14 Dec, 2022 | 00:00
Updated-21 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. There is a CAPTCHA bypass that can lead to subscribing many people.

Action-Not Available
Vendor-fp_newsletter_projectn/a
Product-fp_newslettern/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-1966
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.29% / 51.70%
||
7 Day CHG~0.00%
Published-11 Apr, 2007 | 10:00
Updated-03 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Session fixation vulnerability in eXV2 CMS 2.0.4.3 and earlier allows remote attackers to hijack web sessions by setting the PHPSESSID cookie.

Action-Not Available
Vendor-exv2n/a
Product-content_management_systemn/a
CWE ID-CWE-287
Improper Authentication
CVE-2016-9362
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.1||CRITICAL
EPSS-0.21% / 42.83%
||
7 Day CHG~0.00%
Published-13 Feb, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in WAGO 750-8202/PFC200 prior to FW04 (released August 2015), WAGO 750-881 prior to FW09 (released August 2016), and WAGO 0758-0874-0000-0111. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to edit and to view settings without authenticating.

Action-Not Available
Vendor-wagon/a
Product-750-8202758-xxxx_series_firmwarepfc200_firmware758-874-0000-0111750-xxxx_series_firmwarepfc200750-881WAGO Ethernet cards
CWE ID-CWE-287
Improper Authentication
CVE-2021-21308
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.37% / 57.94%
||
7 Day CHG~0.00%
Published-26 Feb, 2021 | 19:50
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper session management for soft logout

PrestaShop is a fully scalable open source e-commerce solution. In PrestaShop before version 1.7.2 the soft logout system is not complete and an attacker is able to foreign request and executes customer commands. The problem is fixed in 1.7.7.2

Action-Not Available
Vendor-PrestaShop S.A
Product-prestashopPrestaShop
CWE ID-CWE-287
Improper Authentication
CVE-2021-26070
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-7.2||HIGH
EPSS-0.85% / 74.02%
||
7 Day CHG~0.00%
Published-22 Mar, 2021 | 04:40
Updated-16 Sep, 2024 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to evade behind-the-firewall protection of app-linked resources via a Broken Authentication vulnerability in the `makeRequest` gadget resource. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1.

Action-Not Available
Vendor-Atlassian
Product-data_centerjira_serverjiraJira ServerJira Data Center
CWE ID-CWE-287
Improper Authentication
CVE-2016-4510
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.1||CRITICAL
EPSS-0.69% / 70.86%
||
7 Day CHG-0.42%
Published-09 Jun, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to bypass authentication and read arbitrary files via unspecified vectors.

Action-Not Available
Vendor-trihedraln/a
Product-vtscadan/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-23365
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-4.8||MEDIUM
EPSS-0.37% / 57.83%
||
7 Day CHG~0.00%
Published-26 Apr, 2021 | 10:05
Updated-17 Sep, 2024 | 00:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass

The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data).

Action-Not Available
Vendor-tykn/a
Product-tyk-identity-brokergithub.com/TykTechnologies/tyk-identity-broker
CWE ID-CWE-287
Improper Authentication
CVE-2006-0633
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.50% / 65.09%
||
7 Day CHG~0.00%
Published-10 Feb, 2006 | 11:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The make_password function in ipsclass.php in Invision Power Board (IPB) 2.1.4 uses random data generated from partially predictable seeds to create the authentication code that is sent by e-mail to a user with a lost password, which might make it easier for remote attackers to guess the code and change the password for an IPB account, possibly involving millions of requests.

Action-Not Available
Vendor-invisionpowern/a
Product-invision_power_boardn/a
CWE ID-CWE-287
Improper Authentication
CVE-2014-3895
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-6.4||MEDIUM
EPSS-0.30% / 53.15%
||
7 Day CHG~0.00%
Published-29 Jul, 2014 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The I-O DATA TS-WLCAM camera with firmware 1.06 and earlier, TS-WLCAM/V camera with firmware 1.06 and earlier, TS-WPTCAM camera with firmware 1.08 and earlier, TS-PTCAM camera with firmware 1.08 and earlier, TS-PTCAM/POE camera with firmware 1.08 and earlier, and TS-WLC2 camera with firmware 1.02 and earlier allow remote attackers to bypass authentication, and consequently obtain sensitive credential and configuration data, via unspecified vectors.

Action-Not Available
Vendor-iodatan/a
Product-ts-wlc2_camera_firmwarets-wlcam\/v_camerats-wptcam_camerats-ptcam\/poe_camera_firmwarets-ptcam_camera_firmwarets-wptcam_camera_firmwarets-ptcam\/poe_camerats-wlcam_camera_firmwarets-wlcam\/v_camera_firmwarets-wlc2_camerats-ptcam_camerats-wlcam_cameran/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-4562
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.23% / 45.92%
||
7 Day CHG~0.00%
Published-13 Oct, 2023 | 01:26
Updated-27 Feb, 2025 | 20:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure, Information Tampering and Authentication Bypass Vulnerability in MELSEC-F Series main module

Improper Authentication vulnerability in Mitsubishi Electric Corporation MELSEC-F Series main modules allows a remote unauthenticated attacker to obtain sequence programs from the product or write malicious sequence programs or improper data in the product without authentication by sending illegitimate messages.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-fx3g-40mt\/es_firmwarefx3g-60_mt\/dss_firmwarefx3uc-16mt\/d-p4_firmwarefx3u-48mr\/dsfx3u-48mt\/es-afx3u-32mr\/es-afx3u-48mr\/ds_firmwarefx3u-128mr\/es-afx3u-80mt\/dss_firmwarefx3uc-32mt-lt-2_firmwarefx3u-16mt\/dss_firmwarefx3s-10mt\/es_firmwarefx3g-4da-adp_firmwarefx3s-10mt\/dssfx3u-32mr\/dsfx3u-128mt\/es-afx3g-4da-pnk-adpfx3g-24mt\/es_firmwarefx3s-20mt\/dsfx3u-32mt\/dsfx3g-40_mt\/es_firmwarefx3u-80mt\/esfx3s-14mt\/dssfx3u-enet-p502_firmwarefx3g-14_mt\/dssfx3s-10mt\/dss_firmwarefx3sa-10mr-cmfx3gc_firmwarefx3g-14mr\/es-a_firmwarefx3u-16mr\/es-afx3g-4da-pnk-adp_firmwarefx3g-232adp\(-mb\)fx3uc-16mt\/dfx3s-30mt\/ess-2ad_firmwarefx3g-232adp\(-mb\)_firmwarefx3ge-24mr\/es_firmwarefx3g-24mt\/essfx3s-20mt\/dss_firmwarefx3u-64mt\/essfx3uc-32mt\/dss_firmwarefx3u-128mt\/es_firmwarefx3s-20mt\/es_firmwarefx3g-14_mr\/ds_firmwarefx3s-10mt\/ess_firmwarefx3g-40mt\/ess_firmwarefx3u-80mr\/es-afx3g-40mt\/essfx3u-32ms\/es_firmwarefx3u-64mr\/ua1_firmwarefx3g-24mt\/dss_firmwarefx3g-40_mt\/dss_firmwarefx3s-20mt\/esfx3u-32mr\/ua1fx3u-128mr\/es_firmwarefx3uc-16mt\/d_firmwarefx3s-10mt\/esfx3u-32mr\/ds_firmwarefx3g-14mt\/essfx3u-16mt\/esfx3ga-40mt-cm_firmwarefx3g-cnv-adp_firmwarefx3g-60mr\/es-a_firmwarefx3s-14mr\/ds_firmwarefx3ge-40mr\/dsfx3ge-40mr\/esfx3s-30mt\/es_firmwarefx3u-32mt\/es_firmwarefx3u-16mr\/ds_firmwarefx3s-14mt\/esfx3uc_firmwarefx3uc-64mt\/dss_firmwarefx3ge-24mr\/esfx3u-32mr\/es-a_firmwarefx3u-80mt\/dsfx3u-32mt\/es-afx3g-40_mt\/ds_firmwarefx3ge-24mt\/essfx3uc-96mt\/dss_firmwarefx3g-14_mr\/dsfx3ge-24mr\/ds_firmwarefx3sa-14mt-cm_firmwarefx3gcfx3g-60_mr\/ds_firmwarefx3g-60mr\/dsfx3g-14mr\/es-afx3g-40mr\/dsfx3u-16mt\/es_firmwarefx3ga-40mt-cmfx3s-20mr\/ds_firmwarefx3ge-24mt\/dss_firmwarefx3ge-40mr\/es_firmwarefx3u-16mr\/dsfx3s-10mr\/es_firmwarefx3g-60_mt\/dsfx3ucfx3sa-30mr-cm_firmwarefx3ge-40mt\/essfx3sa-20mt-cmfx3uc-16mr\/ds-t_firmwarefx3uc-96mt\/d_firmwarefx3sa-20mr-cm_firmwarefx3g-24mt\/es-a_firmwarefx3g-14mr\/dsfx3s-14mt\/essfx3u-128mr\/es-a_firmwarefx3ga-60mt-cmfx3g-60mt\/es-a_firmwarefx3u-32mt\/ess_firmwarefx3u-80mr\/ds_firmwarefx3g-14_mt\/ess_firmwarefx3uc-32mt\/dssfx3uc-16mr\/ds-tfx3g-4ad-adpfx3u-16mt\/es-a_firmwarefx3u-32mt\/dss_firmwarefx3g-24mt\/ds_firmwarefx3s-10mr\/dsfx3g-40mr\/es-a_firmwarefx3uc-16mt\/d-p4fx3g-60_mt\/ess_firmwarefx3u-48mt\/ds_firmwarefx3g-24_mr\/dsfx3g-24_mt\/dsfx3g-4ad-ptw-adpfx3g-60_mt\/essfx3uc-16mt\/dss-p4fx3u-64mt\/es_firmwarefx3sa-14mr-cmfx3u-16mr\/esfx3u-48mr\/esfx3uc-32mt-ltfx3sa-30mr-cmfx3s-30mt\/ds_firmwarefx3g-40_mr\/dsfx3u-48mt\/dssfx3g-24mt\/ess_firmwarefx3u-80mt\/es-a_firmwarefx3u-80mt\/es-afx3g-60mt\/essfx3uc-16mr\/d-t_firmwarefx3u-80mr\/dsfx3s-10mt\/dsfx3u-16mt\/ess_firmwarefx3u-64mt\/ds_firmwarefx3u-48mr\/es_firmwarefx3u-64mr\/ds_firmwarefx3uc-64mt\/dfx3g-60_mt\/esfx3u-64ms\/esfx3g-24_mt\/ds_firmwarefx3s-14mt\/es_firmwarefx3ge-40mr\/ds_firmwarefx3g-60mt\/esfx3g-40_mt\/dsfx3g-14_mr\/esfx3g-24_mt\/dss_firmwarefx3g-24_mt\/es_firmwarefx3g-60_mr\/es_firmwarefx3g-40mt\/dssfx3ge-24mt\/es_firmwarefx3u-48mr\/es-a_firmwarefx3g-60mt\/es_firmwarefx3s-30mt\/dssfx3u-128mr\/esfx3g-14mt\/ds_firmwarefx3u-64mr\/es-a_firmwarefx3gc-32mt\/dssfx3u-48mt\/essfx3u-16mt\/es-afx3u-64mr\/es-afx3g-40mt\/dss_firmwarefx3u-enet-p502fx3g-485adp\(-mb\)_firmwarefx3u-64mt\/dss_firmwarefx3ge-24mr\/dsfx3sa-10mr-cm_firmwarefx3sa-14mt-cmfx3u-64mt\/dssfx3g-60_mr\/dsfx3g-60_mr\/esfx3ge-24mt\/esfx3ge-24mt\/ds_firmwarefx3ge-40mt\/ess_firmwarefx3s-30mr\/ds_firmwarefx3g-3a-adp_firmwarefx3g-14mt\/ess_firmwarefx3g-14mt\/es-a_firmwarefx3u-48mt\/esfx3u-80mr\/es_firmwarefx3g-24mr\/dsfx3u-48mt\/dsfx3s-10mt\/ds_firmwarefx3s-14mr\/dsfx3g-60_mt\/es_firmwarefx3g-40_mt\/dssfx3s-20mr\/dsfx3ge-24mt\/dssfx3g-32_mt\/dss_firmwarefx3ga-40mr-cmfx3ge-40mt\/dssfx3uc-16mt\/dssfx3u-32mt\/es-a_firmwarefx3s-30mr\/dsfx3u-enet_firmwarefx3g-14_mt\/dss_firmwarefx3g-60_mt\/ds_firmwarefx3sa-30mt-cm_firmwarefx3g-4ad-pt-adpfx3s-20mt\/ess_firmwarefx3s-30mt\/es-2adfx3u-32mr\/esfx3s-20mt\/ds_firmwarefx3s-30mt\/esfx3g-14_mt\/dsfx3g-24_mt\/ess_firmwarefx3g-40mt\/es-a_firmwarefx3sa-10mt-cm_firmwarefx3u-48mt\/es-a_firmwarefx3g-14mr\/ds_firmwarefx3sa-20mr-cmfx3g-14mt\/dsfx3g-60mr\/ds_firmwarefx3s-30mt\/essfx3g-24mt\/dssfx3g-24_mt\/essfx3u-enet-l_firmwarefx3s-14mt\/dss_firmwarefx3ge-40mt\/esfx3s-30mt\/ess-2adfx3g-14_mt\/es_firmwarefx3s-14mt\/dsfx3g-40mr\/es_firmwarefx3uc-32mt\/dfx3uc-96mt\/dfx3g-40_mr\/es_firmwarefx3u-64mt\/dsfx3u-48mt\/ess_firmwarefx3u-80mt\/ds_firmwarefx3g-24_mr\/ds_firmwarefx3ga-60mt-cm_firmwarefx3g-14_mt\/ds_firmwarefx3g-24mt\/es-afx3u-64ms\/es_firmwarefx3g-14mr\/es_firmwarefx3ge-24mt\/dsfx3u-80mr\/es-a_firmwarefx3sa-20mt-cm_firmwarefx3g-14_mr\/es_firmwarefx3s-30mr\/esfx3s-14mt\/ess_firmwarefx3s-30mt\/dss_firmwarefx3u-128mt\/ess_firmwarefx3s-30mt\/dsfx3u-80mt\/ess_firmwarefx3uc-32mt\/d_firmwarefx3s-30mt\/ess_firmwarefx3g-60mr\/es-afx3g-14mt\/es-afx3u-64mt\/ess_firmwarefx3g-4ad-adp_firmwarefx3s-20mr\/esfx3ge-40mt\/dss_firmwarefx3g-4ad-tc-adpfx3u-32ms\/esfx3u-enetfx3ga-24mt-cm_firmwarefx3u-48mt\/dss_firmwarefx3u-64mr\/es_firmwarefx3s-14mr\/esfx3uc-16mr\/d-tfx3uc-16mt\/dss_firmwarefx3g-14_mt\/essfx3u-32mr\/es_firmwarefx3g-40mt\/esfx3u-64mr\/esfx3g-40mr\/ds_firmwarefx3g-3a-adpfx3g-60mr\/es_firmwarefx3g-40mt\/ds_firmwarefx3g-4ad-pt-adp_firmwarefx3u-128mt\/es-a_firmwarefx3g-14mt\/dssfx3u-48mr\/es-afx3uc-64mt\/dssfx3g-14mt\/esfx3u-32mt\/esfx3g-24_mr\/es_firmwarefx3u-32mr\/ua1_firmwarefx3ge-24mt\/ess_firmwarefx3g-32_mt\/dssfx3g-40_mt\/esfx3g-24mr\/es-afx3g-cnv-adpfx3g-14mr\/esfx3g-4ad-ptw-adp_firmwarefx3ga-60mr-cmfx3g-24mr\/ds_firmwarefx3ge-40mt\/ds_firmwarefx3g-40_mr\/ds_firmwarefx3u-64mr\/dsfx3s-30mt\/es-2ad_firmwarefx3u-80mt\/es_firmwarefx3u-128mt\/esfx3g-40mt\/dsfx3g-40_mr\/esfx3uc-16mt\/dss-p4_firmwarefx3g-60mr\/esfx3g-24mt\/dsfx3u-64mt\/esfx3s-10mt\/essfx3s-10mr\/ds_firmwarefx3g-40mr\/es-afx3u-32mt\/dssfx3u-64mr\/ua1fx3gc-32mt\/dss_firmwarefx3u-80mt\/essfx3s-30mr\/es-2ad_firmwarefx3u-16mt\/ds_firmwarefx3u-16mt\/dsfx3g-60mt\/dss_firmwarefx3g-24mt\/esfx3sa-30mt-cmfx3u-16mt\/dssfx3s-20mt\/essfx3g-60mt\/dssfx3uc-32mt-lt-2fx3ga-60mr-cm_firmwarefx3gc-32mt\/dfx3g-40mt\/es-afx3s-30mr\/es_firmwarefx3g-485adp\(-mb\)fx3u-128mt\/essfx3s-20mt\/dssfx3g-24_mt\/dssfx3g-40mr\/esfx3g-4ad-tc-adp_firmwarefx3s-14mt\/ds_firmwarefx3g-60_mt\/dssfx3u-80mt\/dssfx3ga-24mt-cmfx3sa-10mt-cmfx3ga-24mr-cm_firmwarefx3gc-32mt\/d_firmwarefx3u-48mt\/es_firmwarefx3ga-24mr-cmfx3g-24mr\/es-a_firmwarefx3u-32mt\/ds_firmwarefx3ge-40mt\/dsfx3g-24_mr\/esfx3g-40_mt\/ess_firmwarefx3g-24_mt\/esfx3ga-40mr-cm_firmwarefx3ge-40mt\/es_firmwarefx3u-64mt\/es-afx3u-16mt\/essfx3g-4da-adpfx3u-64mt\/es-a_firmwarefx3g-14mt\/dss_firmwarefx3g-60mt\/ess_firmwarefx3g-14mt\/es_firmwarefx3sa-14mr-cm_firmwarefx3g-24mr\/es_firmwarefx3u-16mr\/es_firmwarefx3s-14mr\/es_firmwarefx3g-40_mt\/essfx3uc-64mt\/d_firmwarefx3uc-32mt-lt_firmwarefx3uc-96mt\/dssfx3g-24mr\/esfx3g-60mt\/dsfx3u-80mr\/esfx3u-16mr\/es-a_firmwarefx3g-60mt\/es-afx3g-14_mt\/esfx3g-60mt\/ds_firmwarefx3s-10mr\/esfx3s-20mr\/es_firmwarefx3s-30mr\/es-2adfx3u-enet-lfx3u-32mt\/essMELSEC-F Series FX3U-80MT/ES-AMELSEC-F Series FX3UC-16MT/DMELSEC-F Series FX3U-48MR/ES-AMELSEC-F Series FX3U-128MR/ES-AMELSEC-F Series FX3U-80MT/ESMELSEC-F Series FX3S-10MR/ESMELSEC-F Series FX3U-128MT/DSMELSEC-F Series FX3U-64MR/UA1MELSEC-F Series FX3U-80MR/ESMELSEC-F Series FX3U-80MT/ESSMELSEC-F Series FX3SA-30MR-CMMELSEC-F Series FX3U-16MT/ESMELSEC-F Series FX3G-24MT/ESMELSEC-F Series FX3U-32MR/DSMELSEC-F Series FX3U-48MR/ESMELSEC-F Series FX3U-32MR/UA1MELSEC-F Series FX3GA-60MR-CMMELSEC-F Series FX3GE-40MT/DSMELSEC-F Series FX3G-60MT/ESMELSEC-F Series FX3G-40MT/DSMELSEC-F Series FX3G-24MT/DSMELSEC-F Series FX3GA-40MR-CMMELSEC-F Series FX3GA-60MT-CMMELSEC-F Series FX3G-40MR/ESMELSEC-F Series FX3U-64MT/ESSMELSEC-F Series FX3UC-64MT/DSSMELSEC-F Series FX3S-10MT/DSMELSEC-F Series FX3U-128MT/ESMELSEC-F Series FX3G-24MR/ESMELSEC-F Series FX3G-24MR/ES-AMELSEC-F Series FX3U-80MR/ES-AMELSEC-F Series FX3G-14MR/ES-AMELSEC-F Series FX3U-48MT/ES-AMELSEC-F Series FX3S-14MT/ESMELSEC-F Series FX3U-32MR/ESMELSEC-F Series FX3G-14MT/DSMELSEC-F Series FX3G-40MT/ES-AMELSEC-F Series FX3SA-14MT-CMMELSEC-F Series FX3GE-40MR/ESMELSEC-F Series FX3U-128MT/ESSMELSEC-F Series FX3S-14MR/ESMELSEC-F Series FX3G-60MR/ESMELSEC-F Series FX3GE-24MT/DSSMELSEC-F Series FX3U-80MT/DSSMELSEC-F Series FX3GE-40MT/DSSMELSEC-F Series FX3U-48MT/ESSMELSEC-F Series FX3SA-10MT-CMMELSEC-F Series FX3U-32MT/DSMELSEC-F Series FX3U-16MT/DSSMELSEC-F Series FX3S-14MT/DSMELSEC-F Series FX3G-40MR/ES-AMELSEC-F Series FX3S-30MT/DSMELSEC-F Series FX3UC-32MT/DMELSEC-F Series FX3U-64MR/DSMELSEC-F Series FX3GE-40MT/ESSMELSEC-F Series FX3S-10MT/ESSMELSEC-F Series FX3G-24MT/ESSMELSEC-F Series FX3S-20MR/ESMELSEC-F Series FX3SA-20MT-CMMELSEC-F Series FX3S-30MT/DSSMELSEC-F Series FX3G-14MT/ESMELSEC-F Series FX3SA-20MR-CMMELSEC-F Series FX3GE-24MT/DSMELSEC-F Series FX3G-60MT/ES-AMELSEC-F Series FX3G-24MT/DSSMELSEC-F Series FX3U-16MR/ES-AMELSEC-F Series FX3U-48MT/ESMELSEC-F Series FX3G-60MT/DSMELSEC-F Series FX3UC-32MT/DSSMELSEC-F Series FX3UC-16MR/DS-TMELSEC-F Series FX3U-64MS/ESMELSEC-F Series FX3S-30MR/DSMELSEC-F Series FX3S-20MR/DSMELSEC-F Series FX3S-20MT/ESMELSEC-F Series FX3UC-32MT-LTMELSEC-F Series FX3G-60MR/DSMELSEC-F Series FX3UC-16MT/D-P4MELSEC-F Series FX3U-32MT/ESSMELSEC-F Series FX3G-24MR/DSMELSEC-F Series FX3U-48MR/DSMELSEC-F Series FX3U-128MR/ESMELSEC-F Series FX3S-30MT/ESMELSEC-F Series FX3S-10MR/DSMELSEC-F Series FX3U-64MT/DSMELSEC-F Series FX3G-60MT/ESSMELSEC-F Series FX3S-10MT/ESMELSEC-F Series FX3U-64MR/ESMELSEC-F Series FX3G-14MT/ESSMELSEC-F Series FX3U-64MT/DSSMELSEC-F Series FX3U-32MS/ESMELSEC-F Series FX3S-20MT/ESSMELSEC-F Series FX3UC-96MT/DMELSEC-F Series FX3G-60MT/DSSMELSEC-F Series FX3U-32MT/DSSMELSEC-F Series FX3U-64MT/ESMELSEC-F Series FX3SA-14MR-CMMELSEC-F Series FX3U-32MT/ES-AMELSEC-F Series FX3U-80MT/DSMELSEC-F Series FX3U-64MT/ES-AMELSEC-F Series FX3U-128MT/ES-AMELSEC-F Series FX3GE-24MR/ESMELSEC-F Series FX3U-128MR/DSMELSEC-F Series FX3U-64MR/ES-AMELSEC-F Series FX3U-48MT/DSSMELSEC-F Series FX3U-16MR/DSMELSEC-F Series FX3G-60MR/ES-AMELSEC-F Series FX3S-20MT/DSSMELSEC-F Series FX3U-128MT/DSSMELSEC-F Series FX3S-30MR/ESMELSEC-F Series FX3U-48MT/DSMELSEC-F Series FX3GA-24MR-CMMELSEC-F Series FX3S-30MT/ESSMELSEC-F Series FX3UC-96MT/DSSMELSEC-F Series FX3G-14MR/ESMELSEC-F Series FX3SA-30MT-CMMELSEC-F Series FX3U-16MR/ESMELSEC-F Series FX3UC-16MT/DSS-P4MELSEC-F Series FX3GE-40MT/ESMELSEC-F Series FX3G-14MR/DSMELSEC-F Series FX3U-32MR/ES-AMELSEC-F Series FX3U-16MT/ESSMELSEC-F Series FX3U-80MR/DSMELSEC-F Series FX3S-30MR/ES-2ADMELSEC-F Series FX3GA-40MT-CMMELSEC-F Series FX3G-40MT/DSSMELSEC-F Series FX3GC-32MT/DMELSEC-F Series FX3UC-16MT/DSSMELSEC-F Series FX3GE-24MT/ESSMELSEC-F Series FX3GE-24MR/DSMELSEC-F Series FX3G-40MR/DSMELSEC-F Series FX3SA-10MR-CMMELSEC-F Series FX3S-20MT/DSMELSEC-F Series FX3G-14MT/DSSMELSEC-F Series FX3G-24MT/ES-AMELSEC-F Series FX3U-16MT/DSMELSEC-F Series FX3G-14MT/ES-AMELSEC-F Series FX3S-14MT/DSSMELSEC-F Series FX3G-40MT/ESMELSEC-F Series FX3S-30MT/ES-2ADMELSEC-F Series FX3GC-32MT/DSSMELSEC-F Series FX3S-10MT/DSSMELSEC-F Series FX3UC-16MR/D-TMELSEC-F Series FX3GE-40MR/DSMELSEC-F Series FX3GE-24MT/ESMELSEC-F Series FX3UC-32MT-LT-2MELSEC-F Series FX3U-16MT/ES-AMELSEC-F Series FX3S-14MT/ESSMELSEC-F Series FX3S-14MR/DSMELSEC-F Series FX3UC-64MT/DMELSEC-F Series FX3S-30MT/ESS-2ADMELSEC-F Series FX3G-40MT/ESSMELSEC-F Series FX3GA-24MT-CMMELSEC-F Series FX3U-32MT/ES
CWE ID-CWE-287
Improper Authentication
CVE-2023-44039
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.41% / 60.31%
||
7 Day CHG+0.11%
Published-03 Apr, 2024 | 00:00
Updated-16 Apr, 2025 | 15:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In VeridiumID before 3.5.0, the WebAuthn API allows an internal unauthenticated attacker (who can pass enrollment verifications and is allowed to enroll a FIDO key) to register their FIDO authenticator to a victim’s account and consequently take over the account.

Action-Not Available
Vendor-veridiumidn/averidiumid
Product-veridiumadn/averidiumad
CWE ID-CWE-287
Improper Authentication
CVE-2016-2300
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.5||MEDIUM
EPSS-0.17% / 38.11%
||
7 Day CHG~0.00%
Published-22 Apr, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ecava IntegraXor before 5.0 build 4522 allows remote attackers to bypass authentication and access unspecified web pages via unknown vectors.

Action-Not Available
Vendor-ecavan/a
Product-integraxorn/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-21982
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-9.1||CRITICAL
EPSS-0.27% / 49.72%
||
7 Day CHG~0.00%
Published-01 Apr, 2021 | 18:45
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Carbon Black Cloud Workload appliance 1.0.0 and 1.01 has an authentication bypass vulnerability that may allow a malicious actor with network access to the administrative interface of the VMware Carbon Black Cloud Workload appliance to obtain a valid authentication token. Successful exploitation of this issue would result in the attacker being able to view and alter administrative configuration settings.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncVMware (Broadcom Inc.)
Product-carbon_black_cloud_workloadlinux_kernelVMware Carbon Black Cloud Workload appliance
CWE ID-CWE-287
Improper Authentication
CVE-2020-11301
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-2.35% / 84.26%
||
7 Day CHG~0.00%
Published-08 Sep, 2021 | 11:25
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication of un-encrypted plaintext Wi-Fi frames in an encrypted network can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250mdm9640_firmwaresm6250p_firmwareipq4028_firmwareqca8337ar9380ipq8173_firmwareqcn5124mdm9645wcn3950_firmwareqca6595au_firmwaresa6155mdm8215sd_455_firmwareqcs6125_firmwaresa415mwcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125mdm9206_firmwarewcn3660bsd460_firmwareqca8081_firmwarewcn3998_firmwareqca6420apq8053_firmwareqca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwareipq8072_firmwaresa8155_firmwareipq8068qca6430wcd9340sdm830_firmwaresd765gmdm9250_firmwareqca9888_firmwareqcn6122qca6696_firmwarewcd9371sd870_firmwareqcn5154_firmwaremdm8215_firmwaresd_8cxsa8150par7420_firmwareqca9992_firmwaresd660sd865_5g_firmwaresd712sd660_firmwareqcn5121qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca6428_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca9980_firmwareipq8078sdx55m_firmwareipq8173sd670_firmwareqca6574csr8811_firmwarewcd9380qualcomm215qcs410qcn5024sd690_5g_firmwareqca9379_firmwaresdx24_firmwareqca9985qcn9012_firmwaresd439_firmwareipq6018_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqca6584_firmwaresd_8c_firmwaremdm9215_firmwareipq6028ipq8064sd835pmp8074wcn3980_firmwaresd730wcn6740_firmwareqcn5064_firmwaresd678_firmwareapq8064au_firmwareipq8078_firmwareqcn5054qcs603qca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwarewcn6855qcn7605_firmwareqcs610_firmwaresa6145pqca9886_firmwarear8031sdm630_firmwaresd820_firmwareqca6391_firmwareqca4024wcd9370_firmwaresdx55apq8053qcn5021_firmwarecsra6640qca9379qcn7606qsm8250_firmwaremdm9150_firmwareqcn5500wsa8830qca9561csrb31024qca9563_firmwaremdm9628_firmwaremdm9650sd_636qca9992qcs4290mdm9250qca6420_firmwareapq8009_firmwaresd690_5gmdm9310_firmwaresd675_firmwareipq8072qca6564qca6426wcn3990_firmwareqca9984_firmwareqca9377wcd9385_firmwaresdxr2_5g_firmwarewhs9410wcd9326_firmwarewcn3615_firmwareipq8074aqca9982qca6330_firmwaresa8155qca6584qcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwarewcn3610_firmwareqca6584ausd778gqfe1952ipq8174qcn5052qca9367sdm630mdm9607_firmwaremdm9655_firmwaresa415m_firmwarewcn3988_firmwareqcn9074qca6421sd778g_firmwaresa8195pqca7550wcd9326wcd9335qca9982_firmwareqcn6023qcs4290_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000wcd9375sm6250_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwareapq8017qcm6125_firmwareqca9882sd780gsd865_5gqca6595qca9896_firmwareipq8065_firmwaresd665_firmwareqcn5154qca8075_firmwaresc8180xipq6005_firmwaremdm9206wcn6855_firmwareqca9888qca6310_firmwaresm7325ipq8070a_firmwaremdm9615qca6574_firmwareqca9886qcn5502_firmwaresd665qca6175asd765qca6574a_firmwaresd850_firmwareapq8009mdm9310csrb31024_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaresc8180x_firmwaremdm9626_firmwareqca9531qca9889_firmwaresd710mdm9607qcn5122mdm9645_firmwaresdx20m_firmwareqcn5022qca6564_firmwaresd768gwcn6740qca8075apq8096au_firmwareqcn6024qcn9022sd845mdm9615_firmwaresdm830ipq6000_firmwaresdx12qcs410_firmwareqca6175a_firmwaresm7325_firmwaresa6150p_firmwareqcs610qcn5550qca6431_firmwarewcd9360_firmwareqca9561_firmwareqca4024_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqca9987_firmwareipq8076amdm9628sd710_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwaresa6155_firmwaresdx12_firmwarewcd9360sdx20mqca6438_firmwarewhs9410_firmwarewcn3999qrb5165_firmwareipq5028qca7500ipq4029_firmwareqcs6125ipq6010sd662_firmwareqcs405qualcomm215_firmwareqca6436wcn6851qcn3018_firmwaresa6155pqcs603_firmwareqca6330wcd9341ipq8068_firmwaremdm9655qca6431sd750gqca9988_firmwarewcn3910_firmwareqfe1922wsa8830_firmwaresd855_firmwarewcn3988qca6438sa8195p_firmwareqca9898ipq4028wcn3610mdm9640ipq5018_firmwareqca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072aqca7500_firmwarewcd9330msm8996au_firmwarecsr6030ipq8076a_firmwareqca7550_firmwareqca6564auipq4029wcn6856_firmwareqcn5164qca9558qca7520_firmwareqcn5054_firmwareipq4019_firmwaresdx50m_firmwareqca8072_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605sd7cwcn3910qca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984qcn9024qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwareqca6421_firmwaremsm8953sd821_firmwarear8031_firmwareqrb5165wcn6851_firmwareipq8070qcn5502qca9887_firmwaresd_636_firmwareqca6564a_firmwareqca9880sd480sd870qcn5121_firmwareqsm8250ipq6018qcn3018sdxr1apq8096auqca6595_firmwareqcs405_firmwaresa8145psd780g_firmwaresd888_firmwaresa8155psd675sd439qca9531_firmwarear8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwaresd678qcn9070sa8145p_firmwareqca7520qcs2290_firmwaresm7250_firmwaresd7c_firmwarecsra6620qca9987qcn9072qca9880_firmwaresd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370qcn5152_firmwareqca6584au_firmwareqcn9000_firmwareipq5018sd_8cx_firmwareqcn7605qca9563sd662qcn5124_firmwareqfe1952_firmwareqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310sa515m_firmwareqca9990sdxr2_5gsd821sa6145p_firmwaresm6250sd712_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwareqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385ar8035csr8811apq8064auipq4019msm8953_firmwareqcn9100_firmwaresda429wsd820wcn6850_firmwarewsa8835_firmwarecsr6030_firmwareqca6564aqca9988qca8072qcm2290_firmwarewcn3990qcn9000sd_675ar9380_firmwaresdx24qcn9012sd888qca9558_firmwareqcn6122_firmwarewsa8835msm8996ausd888_5gsm6250pipq4018qca6574aqca9889qca6174aipq8074qca9994_firmwarewcn6750ipq8076_firmwaresa515mar7420sd855sm4125_firmwareipq8076qfe1922_firmwareqca9887qcn5021ipq8069qcn5152sd768g_firmwaresd460qca6391sdxr1_firmwareipq6005aqt1000_firmwareqcn9100mdm9626qcm4290sdx50mqca9882_firmwaresdx20mdm9215sd_455ipq8074_firmwareqca6574ausa8155p_firmwarewcd9341_firmwareqcm6125wsa8810qcn5500_firmwaremdm9150wcn6856sd_8cwcn3680bsd835_firmwareipq6010_firmwareqca6696sd845_firmwaresa6150pqcn9022_firmwareqca9990_firmwareipq8070aqcn9072_firmwaresd720g_firmwareipq8071_firmwareqcn9074_firmwareqca9896sd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-287
Improper Authentication
CVE-2021-21378
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.2||HIGH
EPSS-0.23% / 46.02%
||
7 Day CHG~0.00%
Published-11 Mar, 2021 | 02:40
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JWT authentication bypass with unknown issuer token

Envoy is a cloud-native high-performance edge/middle/service proxy. In Envoy version 1.17.0 an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list when Envoy's JWT Authentication filter is configured with the `allow_missing` requirement under `requires_any` due to a mistake in implementation. Envoy's JWT Authentication filter can be configured with the `allow_missing` requirement that will be satisfied if JWT is missing (JwtMissed error) and fail if JWT is presented or invalid. Due to a mistake in implementation, a JwtUnknownIssuer error was mistakenly converted to JwtMissed when `requires_any` was configured. So if `allow_missing` was configured under `requires_any`, an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list. Integrity may be impacted depending on configuration if the JWT token is used to protect against writes or modifications. This regression was introduced on 2020/11/12 in PR 13839 which fixed handling `allow_missing` under RequiresAny in a JwtRequirement (see issue 13458). The AnyVerifier aggregates the children verifiers' results into a final status where JwtMissing is the default error. However, a JwtUnknownIssuer was mistakenly treated the same as a JwtMissing error and the resulting final aggregation was the default JwtMissing. As a result, `allow_missing` would allow a JWT token with an unknown issuer status. This is fixed in version 1.17.1 by PR 15194. The fix works by preferring JwtUnknownIssuer over a JwtMissing error, fixing the accidental conversion and bypass with `allow_missing`. A user could detect whether a bypass occurred if they have Envoy logs enabled with debug verbosity. Users can enable component level debug logs for JWT. The JWT filter logs will indicate that there is a request with a JWT token and a failure that the JWT token is missing.

Action-Not Available
Vendor-envoyproxyenvoyproxy
Product-envoyenvoy
CWE ID-CWE-303
Incorrect Implementation of Authentication Algorithm
CWE ID-CWE-287
Improper Authentication
CVE-2020-10594
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.37% / 57.95%
||
7 Day CHG~0.00%
Published-15 Mar, 2020 | 21:22
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained.

Action-Not Available
Vendor-styrian/a
Product-django-rest-framework-json_web_tokensn/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-5152
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.1||CRITICAL
EPSS-1.31% / 78.97%
||
7 Day CHG~0.00%
Published-13 Feb, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Advantech WebAccess Version 8.1. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access pages unrestricted (AUTHENTICATION BYPASS).

Action-Not Available
Vendor-n/aAdvantech (Advantech Co., Ltd.)
Product-webaccessAdvantech WebAccess 8.1
CWE ID-CWE-287
Improper Authentication
CVE-2014-2338
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.32% / 53.98%
||
7 Day CHG~0.00%
Published-16 Apr, 2014 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.

Action-Not Available
Vendor-strongswann/a
Product-strongswann/a
CWE ID-CWE-287
Improper Authentication
CVE-2014-0166
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-34.85% / 96.88%
||
7 Day CHG~0.00%
Published-09 Apr, 2014 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The wp_validate_auth_cookie function in wp-includes/pluggable.php in WordPress before 3.7.2 and 3.8.x before 3.8.2 does not properly determine the validity of authentication cookies, which makes it easier for remote attackers to obtain access via a forged cookie.

Action-Not Available
Vendor-n/aWordPress.org
Product-wordpressn/a
CWE ID-CWE-287
Improper Authentication
CVE-2014-0138
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-1.54% / 80.64%
||
7 Day CHG~0.00%
Published-15 Apr, 2014 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCURL
Product-debian_linuxcurllibcurln/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-21399
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.11% / 29.25%
||
7 Day CHG~0.00%
Published-13 Apr, 2021 | 17:50
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated SubSonic backend access in Ampache

Ampache is a web based audio/video streaming application and file manager. Versions prior to 4.4.1 allow unauthenticated access to Ampache using the subsonic API. To successfully make the attack you must use a username that is not part of the site to bypass the auth checks. For more details and workaround guidance see the referenced GitHub security advisory.

Action-Not Available
Vendor-ampacheampache
Product-ampacheampache
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2014-4198
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.28% / 51.10%
||
7 Day CHG~0.00%
Published-13 Feb, 2020 | 18:28
Updated-06 Aug, 2024 | 11:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Two-Factor Authentication Bypass Vulnerability exists in BS-Client Private Client 2.4 and 2.5 via an XML request that neglects the use of ADPswID and AD parameters, which could let a malicious user access privileged function.

Action-Not Available
Vendor-bssysn/a
Product-rbs_bs-client._retail_clientn/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-43551
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.10% / 27.33%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 10:05
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Authentication in Multi-Mode Call Processor

Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_wear_3100_firmwaresdm429w_firmwareqcm8550_firmwareapq8017sd865_5gqcs410_firmwarerobotics_rb3sw5100psxr1120qcs610_firmwarewcd9335wcd9370qca8081_firmwaresnapdragon_7c_gen_2_compute_firmwaresnapdragon_670_mobileqca4004qca6696snapdragon_x70_modem-rf_firmwarewcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcn6024qcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilewcn6740_firmwarefastconnect_6700wcn3610snapdragon_208_firmwaresnapdragon_750g_5g_mobilesnapdragon_780g_5g_mobilesnapdragon_685_4g_mobilevision_intelligence_200_firmwaresnapdragon_x50_5g_modem-rf_firmwaresnapdragon_782g_mobile_firmwaresnapdragon_wear_4100\+_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395snapdragon_auto_4g_modemsnapdragon_665_mobile_firmwaresc8180xp-aaab9205_lte_modemqca6574au_firmwaresnapdragon_690_5g_mobile_firmware9207_lte_modem_firmwarewcd9341sd626_firmwaresnapdragon_wear_1300qca6574ausnapdragon_820_automotive205_mobilesnapdragon_888\+_5g_mobile_firmwaresnapdragon_x12_lte_modemwsa8810_firmwaresd730_firmwarewsa8845h_firmwarewcd9390csra6640snapdragon_212_mobilemsm8209_firmwaresnapdragon_778g_5g_mobile_firmwaresc8180xp-acafsnapdragon_850_mobile_computewcn3660b_firmwaresd730snapdragon_820_automotive_firmwarefastconnect_6800_firmwareqcs5430snapdragon_690_5g_mobile9207_lte_modemsd835_firmwareqcn6024_firmwaresnapdragon_636_mobile_firmwareqcm5430qcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_712_mobile_firmwareqcm6125_firmwarec-v2x_9150snapdragon_678_mobile_firmwaresnapdragon_425_mobileqcc710snapdragon_1100_wearable_firmwaresnapdragon_xr2_5g_firmwaremdm9615msm8108snapdragon_xr1_firmwaresxr1120_firmwaresnapdragon_x5_lte_modem_firmwaresnapdragon_wear_4100\+315_5g_iot_modem_firmwarefastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwarevideo_collaboration_vc1_platformqfw7114snapdragon_730_mobile_firmwarewcd9385_firmwareqca6421vision_intelligence_200315_5g_iot_modemqca6310wcd9360qca6335snapdragon_x65_5g_modem-rfqcs4490snapdragon_730_mobilesnapdragon_wear_3100mdm9250snapdragon_680_4g_mobilewsa8845qca6421_firmwareqcm6125snapdragon_212_mobile_firmwaremdm9230sc8180x-adqca6564au_firmwaresd820snapdragon_429_mobile_firmwarewsa8810mdm8207snapdragon_835_mobilesnapdragon_888_5g_mobile_firmwareqca6595ausnapdragon_888_5g_mobilesm7315_firmwaresnapdragon_wear_2500snapdragon_662_mobile_firmwaresnapdragon_685_4g_mobile_firmwarewcd9326_firmwaresnapdragon_845_mobile_firmwaremdm9640_firmwarewsa8840mdm9230_firmwareqcs8550_firmwaresnapdragon_730g_mobilesnapdragon_782g_mobilesd835snapdragon_8_gen_2_mobile_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwareqca6436_firmwarewcd9371_firmwaresnapdragon_695_5g_mobile_firmwareqcs4490_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqts110wcn3910_firmwaresnapdragon_460_mobilesnapdragon_8_gen_2_mobileqca6420qca6174_firmwarewcn3910mdm9205s_firmwarewcd9370_firmwarecsrb31024qca9367mdm9250_firmwaresnapdragon_712_mobilesnapdragon_835_mobile_firmwarewcn3660bqca6574asnapdragon_8\+_gen_2_mobilewcn3620_firmwareqca6174aqca6584_firmwarewcd9340qcm2290snapdragon_1200_wearable_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6335_firmwareqcm6490sm8550p_firmwareqcm8550wcn3988snapdragon_765_5g_mobile_firmwaresnapdragon_662_mobileqcn9024vision_intelligence_300_firmwareqca6574215_mobilesd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwaresdx57msmart_audio_400qcn9024_firmwarewsa8845hwcd9326qcs410qcm2290_firmwarevision_intelligence_100snapdragon_630_mobileqca6564asnapdragon_765g_5g_mobile_firmwaresnapdragon_wear_2100_firmwarewsa8830smart_display_200_firmwaresm8550psnapdragon_wear_2100snapdragon_768g_5g_mobile_firmwaresnapdragon_7c_gen_2_computesc8180x\+sdx55_firmwarear8035msm8996ausnapdragon_208snapdragon_7c_compute_firmwarewcn3620qcm4325qcn6224snapdragon_865\+_5g_mobile_firmwaresnapdragon_x5_lte_modemsnapdragon_429_mobilesc8180x\+sdx55qca6698aqwcn3950_firmwaresm6250mdm9205ssnapdragon_480\+_5g_mobilefastconnect_6200sd670wcn3680bsm7325p_firmwarewcd9360_firmwaresc8180x-acaf_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_210_firmwaresnapdragon_660_mobile_firmwarefastconnect_6700_firmwaresnapdragon_710_mobile_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990robotics_rb3_firmwaresnapdragon_x75_5g_modem-rf_firmwaresd670_firmwaresnapdragon_855_mobileqcs6490snapdragon_210snapdragon_695_5g_mobilesc8180xp-acaf_firmwaresnapdragon_778g_5g_mobilefastconnect_6200_firmwarewsa8830_firmwaresnapdragon_460_mobile_firmwareqcn6224_firmwarevision_intelligence_100_firmwareqca6431wsa8845_firmwaresd660_firmwarewsa8832mdm9330_firmwaresnapdragon_auto_4g_modem_firmwaresnapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwaresdx57m_firmwaresxr2130_firmwaresnapdragon_860_mobile_firmwarear8035_firmwaresc8180xp-aaab_firmwaremdm9630snapdragon_778g\+_5g_mobile205_mobile_firmwareqca6320msm8608_firmwaresd888_firmwaremsm8209wcd9306qca6564auqcs6125_firmwaresnapdragon_1100_wearablesnapdragon_425_mobile_firmwaresnapdragon_wear_1300_firmwaresm6250p_firmwaresc8180xp-adar6003wsa8815_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwareqcm4290sd_455_firmwaremsm8608sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresnapdragon_665_mobilesm7250p_firmwarewcn3680_firmwareqcm4490_firmwarevision_intelligence_400_firmwarewcn3950qcs6125snapdragon_870_5g_mobile_firmwaresnapdragon_730g_mobile_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_732g_mobileqca4004_firmwaresnapdragon_778g\+_5g_mobile_firmwareapq8037smart_audio_400_firmwaresnapdragon_870_5g_mobilesd_675_firmwaresmart_audio_200_firmwaresnapdragon_678_mobilesnapdragon_720g_mobilesd_455sm7250pcsrb31024_firmwaresc8180x-acafsm6250_firmwaresc8180x-ad_firmwaresnapdragon_7c_computeqca6584ausd888qca6320_firmwareqcn6274_firmwaresnapdragon_850_mobile_compute_firmwaresnapdragon_675_mobile_firmwaresnapdragon_wear_2500_firmwaresw5100_firmwarewcn6740snapdragon_768g_5g_mobilesnapdragon_780g_5g_mobile_firmwareqca6310_firmwaresnapdragon_845_mobilesd626fastconnect_6800qfw7114_firmwarefastconnect_7800_firmwaresnapdragon_675_mobilesnapdragon_865_5g_mobile_firmwarewcd9371mdm9630_firmwarefastconnect_6900_firmwareapq8017_firmwarewcd9380smart_audio_200snapdragon_xr2_5gsnapdragon_x24_lte_modemmsm8996au_firmwaresnapdragon_1200_wearablesnapdragon_auto_5g_modem-rf_firmwaresc8180x-aaabsc8180x-aaab_firmwaresw5100video_collaboration_vc3_platformaqt1000wcd9306_firmwaresnapdragon_4_gen_1_mobile_firmware215_mobile_firmwarec-v2x_9150_firmwaresd855qca6431_firmwarewcd9330_firmwareqca6174wcn3990_firmware9205_lte_modem_firmwaresm7315snapdragon_660_mobileqca6698aq_firmwareqcs2290qca6564a_firmwarewcd9385snapdragon_888\+_5g_mobileqcs2290_firmwaremsm8909w_firmwaresnapdragon_8_gen_1_mobilewcn3615qca9367_firmwaresnapdragon_630_mobile_firmwarewcd9330mdm8207_firmwaresnapdragon_680_4g_mobile_firmwarewcn3680wcn3610_firmwareqcs4290wcd9390_firmwaresnapdragon_865\+_5g_mobilesd820_firmwareqca6430snapdragon_855\+_mobilesg8275psm6250psnapdragon_765_5g_mobilesnapdragon_860_mobilesdx55_firmwaresc8180xp-ad_firmwaresnapdragon_auto_5g_modem-rfwcn3615_firmwaresxr21309206_lte_modem_firmwaremsm8108_firmwaresnapdragon_x65_5g_modem-rf_firmwareqcm4490csra6640_firmwaresnapdragon_480\+_5g_mobile_firmwareqca6174a_firmwaresm7325psnapdragon_732g_mobile_firmwaresnapdragon_x50_5g_modem-rfapq8037_firmwaresnapdragon_670_mobile_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwaresdm429wsd855_firmwarewcd9335_firmwaremdm9640qca6436snapdragon_x70_modem-rfwcn3980_firmwaresnapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmwareqcn6274qfw7124qca6595au_firmwareqcs610sw5100p_firmwareqca6696_firmwareqcs4290_firmwaresnapdragon_430_mobile_firmwarewcd9380_firmwareqca6574_firmwarecsra6620qca8081sd660mdm9628wsa8815sg4150pqca9377mdm9628_firmwaresnapdragon_x75_5g_modem-rfqcm4325_firmwaresnapdragon_439_mobile_firmware9206_lte_modemqca6574a_firmwaresdx55snapdragon_4_gen_1_mobileqcm4290_firmwaresnapdragon_720g_mobile_firmwaresnapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwaresd675wcd9375_firmwareqca6391snapdragon_710_mobileqts110_firmwaremdm9615_firmwareqcs5430_firmwaresnapdragon_439_mobilesg4150p_firmwareqca6584csra6620_firmwareqcs8550fastconnect_7800sd865_5g_firmwaresnapdragon_8\+_gen_2_mobile_firmwaresnapdragon_xr1wcd9375vision_intelligence_300snapdragon_765g_5g_mobilewcn3988_firmwaresnapdragon_430_mobilesnapdragon_636_mobilesd_675snapdragon_8\+_gen_1_mobile_firmwarevision_intelligence_400wsa8835_firmwaresmart_display_200ar6003_firmwarewcn3980qca6584au_firmwaremdm9330msm8909wwcn3680b_firmwaresnapdragon_w5\+_gen_1_wearablesnapdragon_8_gen_1_mobile_firmwareSnapdragonqcm2290_firmwareqca9377_firmwarequalcomm_video_collaboration_vc1_platform_firmwareqca8337_firmwaremdm9640_firmwaremsm8996au_firmware315_5g_iot_modem_firmwareqcs2290_firmwareqca6431_firmwaremdm9628_firmwareqcn6224_firmwaremsm8909w_firmwaresd670_firmwaremdm9205s_firmwareqca6420_firmwareqca6595au_firmwareqca6174_firmwaresd730_firmwaresd_455_firmwarecsra6620_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcm5430_firmwareqcs6125_firmwareqca6584au_firmwarec-v2x_9150_firmwareqca6310_firmwareqca6430_firmwareqfw7114_firmwarequalcomm_video_collaboration_vc3_platform_firmwaremsm8108_firmwareqca6335_firmwareqcn6024_firmwareqcm4325_firmwareqca6574_firmwareqca6584_firmwareqca6426_firmwaremdm9230_firmwareqca6320_firmwareqca6574a_firmwareqca6574au_firmwarefastconnect_6200_firmwareqca8081_firmwareqca6436_firmwareqca6421_firmware9205_lte_modem_firmwareaqt1000_firmwareqca6564au_firmwarear6003_firmwareqca9367_firmwareqcm8550_firmwareqcm4490_firmwareqcn6274_firmwareqcs4490_firmwarecsrb31024_firmwareqcm6490_firmwarefastconnect_6900_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqcs8550_firmware9206_lte_modem_firmwarefastconnect_6700_firmwareqca6564a_firmwareapq8017_firmwaresd626_firmwareqcn9024_firmwarefastconnect_7800_firmwareqcm4290_firmwareqcs610_firmwareqca6698aq_firmwaremsm8209_firmwarequalcomm_215_mobile_platform_firmwaresd835_firmwareqca6174a_firmwaremdm9250_firmwareqcs4290_firmwarequalcomm_205_mobile_platform_firmware9207_lte_modem_firmwareqca6696_firmwareqcs6490_firmwaremdm8207_firmwareqcs5430_firmwaresd820_firmwareqca6391_firmwaremsm8608_firmwaresd888_firmwareqcc710_firmwaremdm9330_firmwaresd855_firmwaresd865_5g_firmwaremdm9615_firmwareapq8037_firmwaresd660_firmwarefastconnect_6800_firmwareqcs410_firmwareqfw7124_firmwaremdm9630_firmwarear8035_firmwareqcm6125_firmwareqts110_firmware
CWE ID-CWE-287
Improper Authentication
CVE-2013-4966
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.22% / 44.95%
||
7 Day CHG~0.00%
Published-07 Mar, 2014 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The master external node classification script in Puppet Enterprise before 3.2.0 does not verify the identity of consoles, which allows remote attackers to create arbitrary classifications on the master by spoofing a console.

Action-Not Available
Vendor-n/aPerforce Software, Inc. ("Puppet")
Product-puppet_enterprisen/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-44152
Matching Score-4
Assigner-Acronis International GmbH
ShareView Details
Matching Score-4
Assigner-Acronis International GmbH
CVSS Score-6.1||MEDIUM
EPSS-0.26% / 48.88%
||
7 Day CHG~0.00%
Published-27 Sep, 2023 | 11:59
Updated-23 Sep, 2024 | 18:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.

Action-Not Available
Vendor-Linux Kernel Organization, IncAcronis (Acronis International GmbH)Apple Inc.Microsoft Corporation
Product-cyber_protectmacoswindowslinux_kernelAcronis Cyber Protect 15
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-287
Improper Authentication
CVE-2020-11264
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.19% / 41.47%
||
7 Day CHG~0.00%
Published-08 Sep, 2021 | 11:25
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication of Non-EAPOL/WAPI plaintext frames during four-way handshake can lead to arbitrary network packet injection in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwareqca2066sd678sa6150p_firmwaresm7250sa8145p_firmwareqcs610wsa8830qca1062_firmwareqcs2290_firmwareqca8337sm7250_firmwarecsrb31024mdm9650sd_636csra6620qcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwareqca2064_firmwareqca2062qca6174_firmwaresd690_5gsd730_firmwarecsra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarewcd9370csra6640_firmwareqcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9377sa415mwcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950wcd9326_firmwaresd720gwcn3615_firmwarewcn3660bwcn3910_firmwareqca2065sd662sd460_firmwareqca1064sa8155qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auwcd9375_firmwarewcn3615wcn3998_firmwarewcn3999_firmwareqca6420qca6436_firmwareapq8053_firmwaresdx20mqca6564au_firmwareqca6584ausa6155p_firmwaresd778gwcn3999qrb5165_firmwaresdxr2_5gqcs6125sa8155_firmwaresd662_firmwaresdm630sa415m_firmwareqcs405qca6430sc8280xp_firmwarewcn3988_firmwaresa6145p_firmwaresm6250sd778g_firmwarewcd9340sa8195pwsa8810_firmwaresd765gsd765_firmwareqca6436wcd9326wcd9335sa6155pwcn6851qcs603_firmwareqca6174a_firmwareqcs4290_firmwarewcd9385wcd9341qca2066_firmwareqca6696_firmwareqca2065_firmwaresd750gsd870_firmwareqca1062ar8035qca6390sd_8cxaqt1000apq8064ausa8150psd750g_firmwaresm6250_firmwaremsm8953_firmwarewcd9375wsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresdx20_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwaresd660_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675msm8996au_firmwaresd780gsd865_5gqca6564ausdx24sdx55m_firmwarewcn6856_firmwaresd888wsa8835qca6574msm8996ausd665_firmwarewcd9380sd888_5gqcs410qca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwareqca6174asdx24_firmwaresm7325qca6174qca6430_firmwarewcd9335_firmwarewcn3980wcn6750qca6574_firmwareqcs605wcd9340_firmwaresd855wsa8815wcn6850sd665wcn3910mdm9650_firmwareqca6175asd765qca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd768g_firmwaresd835wcn3980_firmwaresd460qca6391sd730sdx55maqt1000_firmwareqca2062_firmwarewcn6740_firmwaremsm8953sd678_firmwareapq8064au_firmwarear8031_firmwarecsrb31024_firmwareqcm4290sdx50msdx20qrb5165sd480_firmwareqcs603wcn6851_firmwareqca6164_firmwareqca6574ausa8155p_firmwaresd_636_firmwareqca6564a_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870sdx20m_firmwarewcn6855wsa8810qcs610_firmwarewcn6856sa6145pwcn3680bsd835_firmwaresd768gapq8096auar8031qcs405_firmwareqca1064_firmwaresa8145pqca6164qca6696sdm630_firmwareqca6391_firmwarewcn6740qca2064sd780g_firmwaresd845_firmwarewcd9370_firmwaresa6150psd888_firmwaresc8280xpapq8053apq8096au_firmwarecsra6640sa8155psd675sd845sdx55sd720g_firmwareqcs410_firmwareqca6175a_firmwarear8035_firmwareqcm2290sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-287
Improper Authentication
CVE-2017-15519
Matching Score-4
Assigner-NetApp, Inc.
ShareView Details
Matching Score-4
Assigner-NetApp, Inc.
CVSS Score-7.2||HIGH
EPSS-0.41% / 60.72%
||
7 Day CHG~0.00%
Published-06 Mar, 2018 | 20:00
Updated-16 Sep, 2024 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Versions of SnapCenter 2.0 through 3.0.1 allow unauthenticated remote attackers to view and modify backup related data via the Plug-in for NAS File Services. All users are urged to move to version 3.0.1 and perform the mitigation steps or upgrade to 4.0 following the product documentation.

Action-Not Available
Vendor-NetApp, Inc.
Product-snapcenter_serverSnapCenter
CWE ID-CWE-287
Improper Authentication
CVE-2022-26034
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.1||CRITICAL
EPSS-0.28% / 51.10%
||
7 Day CHG~0.00%
Published-15 Apr, 2022 | 01:45
Updated-03 Aug, 2024 | 04:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in the communication protocol provided by AD (Automation Design) server of CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01 allows an attacker to use the functions provided by AD server. This may lead to leakage or tampering of data managed by AD server.

Action-Not Available
Vendor-yokogawaYokogawa Electric Corporation
Product-b\/m9000_vpcentum_vpCENTUM VP series with VP6E5000(AD Suite Engineering ServerFunction) installed and B/M9000 VP
CWE ID-CWE-287
Improper Authentication
CVE-2012-5351
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.31% / 53.56%
||
7 Day CHG~0.00%
Published-09 Oct, 2012 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Axis2 allows remote attackers to forge messages and bypass authentication via a SAML assertion that lacks a Signature element, aka a "Signature exclusion attack," a different vulnerability than CVE-2012-4418.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-axis2n/a
CWE ID-CWE-287
Improper Authentication
CVE-2012-3492
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.70% / 71.02%
||
7 Day CHG~0.00%
Published-28 Sep, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 uses authentication directories even when they have weak permissions, which allows remote attackers to impersonate users by renaming a user's authentication directory.

Action-Not Available
Vendor-condor_projectn/a
Product-condorn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-24882
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.19% / 41.08%
||
7 Day CHG+0.03%
Published-26 Apr, 2022 | 00:00
Updated-22 Apr, 2025 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server side NTLM does not properly check parameters in FreeRDP

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds.

Action-Not Available
Vendor-FreeRDPFedora Project
Product-freerdpextra_packages_for_enterprise_linuxfedoraFreeRDP
CWE ID-CWE-287
Improper Authentication
CVE-2012-3473
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.30% / 52.71%
||
7 Day CHG~0.00%
Published-12 Aug, 2012 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) reports API and (2) administration feature in the comments API in the Ushahidi Platform before 2.5 do not require authentication, which allows remote attackers to generate reports and organize comments via API functions.

Action-Not Available
Vendor-ushahidin/a
Product-ushahidi_platformn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-24976
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.14% / 35.20%
||
7 Day CHG~0.00%
Published-13 Feb, 2022 | 06:20
Updated-03 Aug, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Atheme IRC Services before 7.2.12, when used in conjunction with InspIRCd, allows authentication bypass by ending an IRC handshake at a certain point during a challenge-response login sequence.

Action-Not Available
Vendor-athemen/a
Product-athemen/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-25157
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.69% / 70.91%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-03 Aug, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Password Hash Instead of Password for Authentication vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03UDECPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions, Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions, Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions, Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions, Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions, Mitsubishi Electric MELSEC L series LJ71E71-100 all versions and Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions allows a remote unauthenticated attacker to disclose or tamper with the information in the product by using an eavesdropped password hash.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-fx5uj-24mt\/essfx5uc-32mt\/dss_firmwarefx5uj-24mt\/es_firmwarefx5uj-60mr\/es_firmwarefx5uj_firmwarefx5uj-60mt\/esfx5uj-60mt\/essfx5uc-32mt\/dss-tsfx5ucfx5uc-32mt\/dfx5uj-40mt\/es_firmwarefx5uj-60mt\/es_firmwarefx5uj-24mt\/ess_firmwarefx5uc-32mt\/ds-tsfx5ujfx5uc_firmwarefx5uj-60mr\/esfx5uj-60mt\/ess_firmwarefx5uj-24mr\/esfx5uc-32mr\/ds-ts_firmwarefx5uj-40mt\/ess_firmwarefx5uc-32mr\/ds-tsfx5uc-32mt\/dssfx5uj-40mr\/es_firmwarefx5uc-32mt\/ds-ts_firmwarefx5uj-24mr\/es_firmwarefx5uj-40mt\/essfx5uj-40mt\/esfx5uj-24mt\/esfx5uj-40mr\/esfx5uc-32mt\/dss-ts_firmwarefx5uc-32mt\/d_firmwareMitsubishi Electric MELSEC iQ-F series FX5U(C) CPU; Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU; Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU; Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU; Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU; Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4); Mitsubishi Electric MELSEC iQ-R series RJ71EN71; Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2; Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX; Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2; Mitsubishi Electric MELSEC Q series Q03UDECPU; Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4); Mitsubishi Electric MELSEC Q series QJ71E71-100; Mitsubishi Electric MELSEC L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC L series L26CPU-(P)BT; Mitsubishi Electric MELSEC L series LJ71C24(-R2); Mitsubishi Electric MELSEC L series LJ71E71-100; Mitsubishi Electric MELSEC L series LJ72GF15-T2
CWE ID-CWE-287
Improper Authentication
CVE-2020-6091
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-0.35% / 56.84%
||
7 Day CHG~0.00%
Published-22 May, 2020 | 13:53
Updated-04 Aug, 2024 | 08:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable authentication bypass vulnerability exists in the ESPON Web Control functionality of Epson EB-1470Ui MAIN: 98009273ESWWV107 MAIN2: 8X7325WWV303. A specially crafted series of HTTP requests can cause authentication bypass resulting in information disclosure. An attacker can send an HTTP request to trigger this vulnerability.

Action-Not Available
Vendor-epsonn/a
Product-eb-1470uieb-1470ui_firmwareEpson
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-287
Improper Authentication
CVE-2020-5148
Matching Score-4
Assigner-SonicWall, Inc.
ShareView Details
Matching Score-4
Assigner-SonicWall, Inc.
CVSS Score-8.2||HIGH
EPSS-0.12% / 31.31%
||
7 Day CHG~0.00%
Published-05 Mar, 2021 | 03:45
Updated-04 Aug, 2024 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SonicWall SSO-agent default configuration uses NetAPI to probe the associated IP's in the network, this client probing method allows a potential attacker to capture the password hash of the privileged user and potentially forces the SSO Agent to authenticate allowing an attacker to bypass firewall access controls.

Action-Not Available
Vendor-SonicWall Inc.
Product-directory_services_connectorDirectory Services Connector
CWE ID-CWE-287
Improper Authentication
CVE-2025-49591
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.4||HIGH
EPSS-0.29% / 52.32%
||
7 Day CHG+0.04%
Published-18 Jun, 2025 | 22:15
Updated-11 Aug, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CryptPad 2FA Bypass Vulnerability

CryptPad is a collaboration suite. Prior to version 2025.3.0, enforcement of Two-Factor Authentication (2FA) in CryptPad can be trivially bypassed, due to weak implementation of access controls. An attacker that compromises a user's credentials can gain access to the victim's account, even if the victim has 2FA set up. This is due to 2FA not being enforced if the path parameter is not 44 characters long, which can be bypassed by simply URL encoding a single character in the path. This issue has been patched in version 2025.3.0.

Action-Not Available
Vendor-cryptpadXWiki SAS
Product-cryptpadcryptpad
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2016-4432
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.47% / 63.61%
||
7 Day CHG~0.00%
Published-01 Jun, 2016 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-qpid_broker-jn/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-36569
Matching Score-4
Assigner-Go Project
ShareView Details
Matching Score-4
Assigner-Go Project
CVSS Score-9.1||CRITICAL
EPSS-0.07% / 20.42%
||
7 Day CHG~0.00%
Published-27 Dec, 2022 | 21:12
Updated-11 Apr, 2025 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass in github.com/nanobox-io/golang-nanoauth

Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty token.

Action-Not Available
Vendor-digitaloceangithub.com/nanobox-io/golang-nanoauth
Product-golang-nanoauthgithub.com/nanobox-io/golang-nanoauth
CWE ID-CWE-287
Improper Authentication
CVE-2025-47275
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.02% / 4.77%
||
7 Day CHG~0.00%
Published-15 May, 2025 | 21:13
Updated-22 May, 2025 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Brute Force Authentication Tags of CookieStore Sessions in Auth0-PHP SDK

Auth0-PHP provides the PHP SDK for Auth0 Authentication and Management APIs. Starting in version 8.0.0-BETA1 and prior to version 8.14.0, session cookies of applications using the Auth0-PHP SDK configured with CookieStore have authentication tags that can be brute forced, which may result in unauthorized access. Certain pre-conditions are required to be vulnerable to this issue: Applications using the Auth0-PHP SDK, or the Auth0/symfony, Auth0/laravel-auth0, and Auth0/wordpress SDKs that rely on the Auth0-PHP SDK; and session storage configured with CookieStore. Upgrade Auth0/Auth0-PHP to v8.14.0 to receive a patch. As an additional precautionary measure, rotating cookie encryption keys is recommended. Note that once updated, any previous session cookies will be rejected.

Action-Not Available
Vendor-auth0
Product-auth0-PHP
CWE ID-CWE-287
Improper Authentication
CVE-2022-41436
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.26% / 48.92%
||
7 Day CHG~0.00%
Published-14 Oct, 2022 | 00:00
Updated-14 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in OXHOO TP50 OXH1.50 allows unauthenticated attackers to access the administrative panel via browsing to the URL http://device_ip/index1.html.

Action-Not Available
Vendor-oxhoon/a
Product-tp50_firmwaretp50n/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-28050
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-1.60% / 80.95%
||
7 Day CHG~0.00%
Published-05 Mar, 2021 | 16:36
Updated-04 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zoho ManageEngine Desktop Central before build 10.0.647 allows a single authentication secret from multiple agents to communicate with the server.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.
Product-manageengine_desktop_centraln/a
CWE ID-CWE-287
Improper Authentication
CVE-2012-3137
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-6.4||MEDIUM
EPSS-57.66% / 98.08%
||
7 Day CHG~0.00%
Published-21 Sep, 2012 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The authentication protocol in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to conduct brute force password guessing attacks, aka "stealth password cracking vulnerability."

Action-Not Available
Vendor-n/aOracle Corporation
Product-database_serverprimavera_p6_enterprise_project_portfolio_managementn/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-25251
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.25% / 47.78%
||
7 Day CHG~0.00%
Published-11 Sep, 2020 | 02:20
Updated-04 Aug, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Hyland OnBase 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. Client-side authentication is used for critical functions such as adding users or retrieving sensitive information.

Action-Not Available
Vendor-hylandn/a
Product-onbasen/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-26214
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-84.89% / 99.29%
||
7 Day CHG~0.00%
Published-06 Nov, 2020 | 17:50
Updated-04 Aug, 2024 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LDAP authentication bypass in Alerta

In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients.

Action-Not Available
Vendor-alerta_projectalerta
Product-alertaalerta
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found