Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-1682

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-08 May, 2014 | 14:00
Updated At-06 Aug, 2024 | 09:50
Rejected At-
Credits

The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:08 May, 2014 | 14:00
Updated At:06 Aug, 2024 | 09:50
Rejected At:
▼CVE Numbering Authority (CNA)

The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html
vendor-advisory
x_refsource_FEDORA
http://www.securityfocus.com/bid/65402
vdb-entry
x_refsource_BID
https://support.zabbix.com/browse/ZBX-7703
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.securityfocus.com/bid/65402
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://support.zabbix.com/browse/ZBX-7703
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html
Resource:
vendor-advisory
x_refsource_FEDORA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.securityfocus.com/bid/65402
vdb-entry
x_refsource_BID
x_transferred
https://support.zabbix.com/browse/ZBX-7703
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/65402
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://support.zabbix.com/browse/ZBX-7703
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:08 May, 2014 | 14:29
Updated At:12 Apr, 2025 | 10:46

The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.0MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 4.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:N
CPE Matches

ZABBIX
zabbix
>>zabbix>>Versions up to 1.8.19(inclusive)
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>1.8
cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>1.8.1
cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>1.8.2
cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>1.8.3
cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>1.8.3
cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>1.8.3
cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>1.8.15
cpe:2.3:a:zabbix:zabbix:1.8.15:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>1.8.16
cpe:2.3:a:zabbix:zabbix:1.8.16:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>1.8.18
cpe:2.3:a:zabbix:zabbix:1.8.18:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.0
cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.0
cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.0
cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.0
cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.0
cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.0
cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.0
cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.1
cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.1
cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.1
cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.2
cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.2
cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.2
cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.3
cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.3
cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.3
cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.4
cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.4
cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.5
cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.5
cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.6
cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.6
cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.7
cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.8
cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.8
cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.9
cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.9
cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.0.10
cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.2.0
cpe:2.3:a:zabbix:zabbix:2.2.0:-:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.2.0
cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.2.0
cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.2.1
cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.2.1
cpe:2.3:a:zabbix:zabbix:2.2.1:-:*:*:*:*:*:*
ZABBIX
zabbix
>>zabbix>>2.2.1
cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>19
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>20
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.htmlcve@mitre.org
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/65402cve@mitre.org
N/A
https://support.zabbix.com/browse/ZBX-7703cve@mitre.org
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/65402af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.zabbix.com/browse/ZBX-7703af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/65402
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://support.zabbix.com/browse/ZBX-7703
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/65402
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.zabbix.com/browse/ZBX-7703
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

124Records found

CVE-2021-34786
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.22% / 44.21%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 05:01
Updated-07 Nov, 2024 | 22:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco BroadWorks CommPilot Application Software Vulnerabilities

Multiple vulnerabilities in Cisco BroadWorks CommPilot Application Software could allow an authenticated, remote attacker to delete arbitrary user accounts or gain elevated privileges on an affected system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-broadworks_commpilot_application_softwareCisco BroadWorks
CWE ID-CWE-620
Unverified Password Change
CWE ID-CWE-287
Improper Authentication
CVE-2021-32738
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.63%
||
7 Day CHG~0.00%
Published-02 Jul, 2021 | 18:15
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Utils.readChallengeTx does not verify the server account signature

js-stellar-sdk is a Javascript library for communicating with a Stellar Horizon server. The `Utils.readChallengeTx` function used in SEP-10 Stellar Web Authentication states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. In js-stellar-sdk before version 8.2.3, the function does not verify that the server has signed the transaction. Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction. Applications calling `Utils.readChallengeTx` should update to version 8.2.3, the first version with a patch for this vulnerability, to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.

Action-Not Available
Vendor-stellarstellar
Product-js-stellar-sdkjs-stellar-sdk
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2021-3153
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 34.49%
||
7 Day CHG~0.00%
Published-26 Mar, 2021 | 02:51
Updated-03 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HashiCorp Terraform Enterprise up to v202102-2 failed to enforce an organization-level setting that required users within an organization to have two-factor authentication enabled. Fixed in v202103-1.

Action-Not Available
Vendor-n/aHashiCorp, Inc.
Product-terraform_enterprisen/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-31131
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.15% / 36.49%
||
7 Day CHG~0.00%
Published-06 Jul, 2022 | 17:55
Updated-22 Apr, 2025 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ownership check missing when updating or deleting mail attachments in Nextcloud mail

Nextcloud mail is a Mail app for the Nextcloud home server product. Versions of Nextcloud mail prior to 1.12.2 were found to be missing user account ownership checks when performing tasks related to mail attachments. Attachments may have been exposed to incorrect system users. It is recommended that the Nextcloud Mail app is upgraded to 1.12.2. There are no known workarounds for this issue. ### Workarounds No workaround available ### References * [Pull request](https://github.com/nextcloud/mail/pull/6600) * [HackerOne](https://hackerone.com/reports/1579820) ### For more information If you have any questions or comments about this advisory: * Create a post in [nextcloud/security-advisories](https://github.com/nextcloud/security-advisories/discussions) * Customers: Open a support ticket at [support.nextcloud.com](https://support.nextcloud.com)

Action-Not Available
Vendor-Nextcloud GmbH
Product-nextcloud_mailsecurity-advisories
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2018-14868
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 42.26%
||
7 Day CHG~0.00%
Published-28 Jun, 2019 | 17:36
Updated-05 Aug, 2024 | 09:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.

Action-Not Available
Vendor-odoon/a
Product-odoon/a
CWE ID-CWE-287
Improper Authentication
CVE-2016-4966
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-2.28% / 84.01%
||
7 Day CHG~0.00%
Published-21 Sep, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The diagnosis_control.php page in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to download PCAP files via vectors related to the UserName GET parameter.

Action-Not Available
Vendor-n/aFortinet, Inc.
Product-fortiwann/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-3775
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-8.8||HIGH
EPSS-0.18% / 40.51%
||
7 Day CHG~0.00%
Published-12 Aug, 2018 | 22:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Authentication in Nextcloud Server prior to version 12.0.3 would allow an attacker that obtained user credentials to bypass the 2 Factor Authentication.

Action-Not Available
Vendor-Nextcloud GmbHHackerOne
Product-nextcloud_serverNextcloud Server
CWE ID-CWE-287
Improper Authentication
CVE-2018-20937
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.15% / 36.44%
||
7 Day CHG~0.00%
Published-01 Aug, 2019 | 16:06
Updated-05 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cPanel before 68.0.27 does not validate database and dbuser names during renames (SEC-321).

Action-Not Available
Vendor-n/acPanel (WebPros International, LLC)
Product-cpaneln/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-19505
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.40% / 60.20%
||
7 Day CHG~0.00%
Published-03 Jan, 2019 | 19:00
Updated-05 Aug, 2024 | 11:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Remedy AR System Server in BMC Remedy 7.1 may fail to set the correct user context in certain impersonation scenarios, which can allow a user to act with the identity of a different user, because userdata.js in the WOI:WorkOrderConsole component allows a username substitution involving a UserData_Init call.

Action-Not Available
Vendor-bmcn/a
Product-remedy_action_request_system_servern/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-26074
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 48.97%
||
7 Day CHG~0.00%
Published-16 Apr, 2021 | 03:00
Updated-12 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions from version 1.1.0 before version 2.1.3 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.

Action-Not Available
Vendor-Atlassian
Product-connect_spring_bootAtlassian Connect Spring Boot (ACSB)
CWE ID-CWE-287
Improper Authentication
CVE-2021-26073
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-7.7||HIGH
EPSS-0.34% / 56.24%
||
7 Day CHG~0.00%
Published-16 Apr, 2021 | 03:00
Updated-12 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Broken Authentication in Atlassian Connect Express (ACE) from version 3.0.2 before version 6.6.0: Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Express versions from 3.0.2 before 6.6.0 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.

Action-Not Available
Vendor-Atlassian
Product-connect_expressAtlassian Connect Express (ACE)
CWE ID-CWE-287
Improper Authentication
CVE-2021-24017
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.15% / 36.67%
||
7 Day CHG~0.00%
Published-30 Sep, 2021 | 15:21
Updated-25 Oct, 2024 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper authentication in Fortinet FortiManager version 6.4.3 and below, 6.2.6 and below allows attacker to assign arbitrary Policy and Object modules via crafted requests to the request handler.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortimanagerFortinet FortiManager
CWE ID-CWE-287
Improper Authentication
CVE-2018-0505
Matching Score-4
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-4
Assigner-Debian GNU/Linux
CVSS Score-6.5||MEDIUM
EPSS-0.53% / 66.20%
||
7 Day CHG~0.00%
Published-04 Oct, 2018 | 20:00
Updated-16 Sep, 2024 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BotPasswords can bypass CentralAuth's account lock

Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth's account lock

Action-Not Available
Vendor-Debian GNU/LinuxWikimedia Foundation
Product-debian_linuxmediawikimediawiki
CWE ID-CWE-287
Improper Authentication
CVE-2015-7974
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.7||HIGH
EPSS-3.67% / 87.42%
||
7 Day CHG~0.00%
Published-26 Jan, 2016 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."

Action-Not Available
Vendor-ntpn/aSiemens AGDebian GNU/LinuxNetApp, Inc.
Product-oncommand_balancetim_4r-ientptim_4r-ie_dnp3_firmwaretim_4r-ie_dnp3clustered_data_ontapdebian_linuxtim_4r-ie_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2015-5298
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.73% / 71.67%
||
7 Day CHG~0.00%
Published-07 Jul, 2022 | 18:35
Updated-06 Aug, 2024 | 06:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Google Login Plugin (versions 1.0 and 1.1) allows malicious anonymous users to authenticate successfully against Jenkins instances that are supposed to be locked down to a particular Google Apps domain through client-side request modification.

Action-Not Available
Vendor-n/aJenkins
Product-google_loginJenkins Google Login Plugin
CWE ID-CWE-287
Improper Authentication
CVE-2014-9278
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4||MEDIUM
EPSS-0.35% / 56.80%
||
7 Day CHG~0.00%
Published-06 Dec, 2014 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.

Action-Not Available
Vendor-n/aRed Hat, Inc.OpenBSD
Product-enterprise_linuxfedoraopensshn/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-1773
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.16% / 37.45%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 14:00
Updated-17 Sep, 2024 | 01:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Datacap Fastdoc Capture 9.1.1, 9.1.3, and 9.1.4 could allow an authenticated user to bypass future authentication mechanisms once the initial login is completed. IBM X-Force ID: 148691.

Action-Not Available
Vendor-IBM Corporation
Product-datacapDatacap
CWE ID-CWE-287
Improper Authentication
CVE-2017-7562
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 48.77%
||
7 Day CHG~0.00%
Published-26 Jul, 2018 | 15:00
Updated-05 Aug, 2024 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass flaw was found in the way krb5's certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary principals under rare and erroneous circumstances.

Action-Not Available
Vendor-MIT (Massachusetts Institute of Technology)Red Hat, Inc.
Product-enterprise_linux_serverenterprise_linux_workstationenterprise_linuxkerberos_5enterprise_linux_desktopkrb5
CWE ID-CWE-295
Improper Certificate Validation
CWE ID-CWE-287
Improper Authentication
CVE-2021-20018
Matching Score-4
Assigner-SonicWall, Inc.
ShareView Details
Matching Score-4
Assigner-SonicWall, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.09% / 26.83%
||
7 Day CHG~0.00%
Published-13 Mar, 2021 | 02:10
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A post-authenticated vulnerability in SonicWall SMA100 allows an attacker to export the configuration file to the specified email address. This vulnerability impacts SMA100 version 10.2.0.5 and earlier.

Action-Not Available
Vendor-SonicWall Inc.
Product-sma100sma100_firmwareSMA100
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-287
Improper Authentication
CVE-2017-2604
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.05% / 15.12%
||
7 Day CHG~0.00%
Published-15 May, 2018 | 21:00
Updated-05 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Jenkins before versions 2.44, 2.32.2 low privilege users were able to act on administrative monitors due to them not being consistently protected by permission checks (SECURITY-371).

Action-Not Available
Vendor-[UNKNOWN]Jenkins
Product-jenkinsjenkins
CWE ID-CWE-358
Improperly Implemented Security Check for Standard
CWE ID-CWE-287
Improper Authentication
CVE-2011-4590
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4||MEDIUM
EPSS-0.14% / 34.59%
||
7 Day CHG~0.00%
Published-20 Jul, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web services implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly consider the maintenance-mode state and account attributes during login attempts, which allows remote authenticated users to bypass intended access restrictions by connecting to a webservice server.

Action-Not Available
Vendor-n/aMoodle Pty Ltd
Product-moodlen/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-45900
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 42.31%
||
7 Day CHG~0.00%
Published-30 Mar, 2022 | 21:38
Updated-04 Aug, 2024 | 04:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vivoh Webinar Manager before 3.6.3.0 has improper API authentication. When a user logs in to the administration configuration web portlet, a VIVOH_AUTH cookie is assigned so that they can be uniquely identified. Certain APIs can be successfully executed without proper authentication. This can let an attacker impersonate as victim and make state changing requests on their behalf.

Action-Not Available
Vendor-vivohn/a
Product-webinar_managern/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-26136
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.22% / 44.16%
||
7 Day CHG~0.00%
Published-08 Jun, 2021 | 19:37
Updated-04 Aug, 2024 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In SilverStripe through 4.6.0-rc1, GraphQL doesn't honour MFA (multi-factor authentication) when using basic authentication.

Action-Not Available
Vendor-n/aSilverstripe
Product-silverstripen/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-21544
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-2.7||LOW
EPSS-0.21% / 43.94%
||
7 Day CHG~0.00%
Published-30 Apr, 2021 | 20:55
Updated-17 Sep, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC iDRAC9 versions prior to 4.40.00.00 contain an improper authentication vulnerability. A remote authenticated malicious user with high privileges could potentially exploit this vulnerability to manipulate the username field under the comment section and set the value to any user.

Action-Not Available
Vendor-Dell Inc.
Product-idrac9_firmwareIntegrated Dell Remote Access Controller (iDRAC)
CWE ID-CWE-602
Client-Side Enforcement of Server-Side Security
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found