Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-5617

Summary
Assigner-rapid7
Assigner Org ID-9974b330-7714-4307-a722-5648477acda7
Published At-06 Nov, 2019 | 18:30
Updated At-17 Sep, 2024 | 02:21
Rejected At-
Credits

C4G BLIS Improper Access Control

Computing For Good's Basic Laboratory Information System (also known as C4G BLIS) version 3.4 and earlier suffers from an instance of CWE-284, "Improper Access Control." As a result, an unauthenticated user may change the password of any administrator-level user.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:rapid7
Assigner Org ID:9974b330-7714-4307-a722-5648477acda7
Published At:06 Nov, 2019 | 18:30
Updated At:17 Sep, 2024 | 02:21
Rejected At:
▼CVE Numbering Authority (CNA)
C4G BLIS Improper Access Control

Computing For Good's Basic Laboratory Information System (also known as C4G BLIS) version 3.4 and earlier suffers from an instance of CWE-284, "Improper Access Control." As a result, an unauthenticated user may change the password of any administrator-level user.

Affected Products
Vendor
Computing For Good
Product
Basic Laboratory Information System
Versions
Affected
  • From unspecified through 3.4 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-284CWE-284 Improper Access Control
Type: CWE
CWE ID: CWE-284
Description: CWE-284 Improper Access Control
Metrics
VersionBase scoreBase severityVector
3.110.0CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 10.0
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

C4G BLIS users should update to version 3.5 or later.

Configurations

Workarounds

Exploits

Credits

This vulnerability was first discovered privately and reported internally by C4G BLIS team member Aditi Shah in December 2018. Jacob Robles of Rapid7 rediscovered and reported these issues in March of 2019 per Rapid7's vulnerability disclosure policy (https://www.rapid7.com/security/disclosure/).
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://blog.rapid7.com/2019/09/10/r7-2019-09-cve-2019-5617-cve-2019-5643-cve-2019-5644-c4g-blis-authentication-and-authorization-vulnerabilities-fixed/
x_refsource_MISC
Hyperlink: https://blog.rapid7.com/2019/09/10/r7-2019-09-cve-2019-5617-cve-2019-5643-cve-2019-5644-c4g-blis-authentication-and-authorization-vulnerabilities-fixed/
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://blog.rapid7.com/2019/09/10/r7-2019-09-cve-2019-5617-cve-2019-5643-cve-2019-5644-c4g-blis-authentication-and-authorization-vulnerabilities-fixed/
x_refsource_MISC
x_transferred
Hyperlink: https://blog.rapid7.com/2019/09/10/r7-2019-09-cve-2019-5617-cve-2019-5643-cve-2019-5644-c4g-blis-authentication-and-authorization-vulnerabilities-fixed/
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@rapid7.com
Published At:06 Nov, 2019 | 19:15
Updated At:14 Sep, 2021 | 12:05

Computing For Good's Basic Laboratory Information System (also known as C4G BLIS) version 3.4 and earlier suffers from an instance of CWE-284, "Improper Access Control." As a result, an unauthenticated user may change the password of any administrator-level user.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.110.0CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 10.0
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

gatech
gatech
>>computing_for_good\'s_basic_laboratory_information_system>>Versions up to 3.4(inclusive)
cpe:2.3:a:gatech:computing_for_good\'s_basic_laboratory_information_system:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-306Primarynvd@nist.gov
CWE-284Secondarycve@rapid7.com
CWE ID: CWE-306
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-284
Type: Secondary
Source: cve@rapid7.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://blog.rapid7.com/2019/09/10/r7-2019-09-cve-2019-5617-cve-2019-5643-cve-2019-5644-c4g-blis-authentication-and-authorization-vulnerabilities-fixed/cve@rapid7.com
Exploit
Third Party Advisory
Hyperlink: https://blog.rapid7.com/2019/09/10/r7-2019-09-cve-2019-5617-cve-2019-5643-cve-2019-5644-c4g-blis-authentication-and-authorization-vulnerabilities-fixed/
Source: cve@rapid7.com
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

910Records found

CVE-2019-5644
Matching Score-10
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-10
Assigner-Rapid7, Inc.
CVSS Score-10||CRITICAL
EPSS-1.91% / 82.56%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 18:30
Updated-16 Sep, 2024 | 22:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
C4G BLIS Improper Access Control

Computing For Good's Basic Laboratory Information System (also known as C4G BLIS) version 3.5 and earlier suffers from an instance of CWE-284, "Improper Access Control." As a result, an unauthenticated user may alter several facets of a user account, including promoting any user to an administrator.

Action-Not Available
Vendor-gatechComputing For Good
Product-computing_for_good\'s_basic_laboratory_information_systemBasic Laboratory Information System
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-5643
Matching Score-6
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-6
Assigner-Rapid7, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.84% / 73.76%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 18:30
Updated-16 Sep, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
C4G BLIS Improper Access Control

Computing For Good's Basic Laboratory Information System (also known as C4G BLIS) version 3.5 and earlier suffers from an instance of CWE-284, "Improper Access Control." As a result, an unauthenticated user may enumerate the user names and facility names in use on a particular installation.

Action-Not Available
Vendor-gatechComputing For Good
Product-computing_for_good\'s_basic_laboratory_information_systemBasic Laboratory Information System
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-57154
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 20.73%
||
7 Day CHG~0.00%
Published-20 Aug, 2025 | 00:00
Updated-22 Aug, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect access control in dts-shop v0.0.1-SNAPSHOT allows attackers to bypass authentication via sending a crafted payload to /admin/auth/index.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-284
Improper Access Control
CVE-2024-57032
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.26% / 49.07%
||
7 Day CHG+0.03%
Published-17 Jan, 2025 | 00:00
Updated-19 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WeGIA < 3.2.0 is vulnerable to Incorrect Access Control in controle/control.php. The application does not validate the value of the old password, so it is possible to change the password by placing any value in the senha_antiga field.

Action-Not Available
Vendor-wegian/a
Product-wegian/a
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2017-7912
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.65% / 69.81%
||
7 Day CHG~0.00%
Published-08 Apr, 2019 | 14:17
Updated-05 Aug, 2024 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hanwha Techwin SRN-4000, SRN-4000 firmware versions prior to SRN4000_v2.16_170401, A specially crafted http request and response could allow an attacker to gain access to the device management page with admin privileges without proper authentication.

Action-Not Available
Vendor-hanwhasecurityHanwha Techwin
Product-srn-4000_firmwaresrn-4000SRN-4000
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2017-7928
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-10||CRITICAL
EPSS-0.53% / 66.04%
||
7 Day CHG~0.00%
Published-07 Aug, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Improper Access Control issue was discovered in Schweitzer Engineering Laboratories (SEL) SEL-3620 and SEL-3622 Security Gateway Versions R202 and, R203, R203-V1, R203-V2 and, R204, R204-V1. The device does not properly enforce access control while configured for NAT port forwarding, which may allow for unauthorized communications to downstream devices.

Action-Not Available
Vendor-n/aSchweitzer Engineering Laboratories, Inc. (SEL)
Product-sel-3622_firmwaresel-3620_firmwaresel-3620sel-3622Schweitzer Engineering Laboratories, Inc. SEL-3620 and SEL-3622
CWE ID-CWE-284
Improper Access Control
CVE-2021-46009
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.02% / 76.30%
||
7 Day CHG~0.00%
Published-30 Mar, 2022 | 22:18
Updated-04 Aug, 2024 | 04:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Totolink A3100R V5.9c.4577, multiple pages can be read by curl or Burp Suite without authentication. Additionally, admin configurations can be set without cookies.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a3100ra3100r_firmwaren/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-51567
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||CRITICAL
EPSS-94.26% / 99.93%
||
7 Day CHG~0.00%
Published-29 Oct, 2024 | 00:00
Updated-30 Jul, 2025 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-11-28||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.

Action-Not Available
Vendor-n/aCyberPersons LLC
Product-cyberpaneln/acyberpanelCyberPanel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-45420
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-80.81% / 99.11%
||
7 Day CHG~0.00%
Published-14 Feb, 2022 | 13:08
Updated-04 Aug, 2024 | 05:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Emerson Dixell XWEB-500 products are affected by arbitrary file write vulnerability in /cgi-bin/logo_extra_upload.cgi, /cgi-bin/cal_save.cgi, and /cgi-bin/lo_utils.cgi. An attacker will be able to write any file on the target system without any kind of authentication mechanism, and this can lead to denial of service and potentially remote code execution. Note: the product has not been supported since 2018 and should be removed or replaced

Action-Not Available
Vendor-emersonn/a
Product-dixell_xweb-500_firmwaredixell_xweb-500n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-5168
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-9.8||CRITICAL
EPSS-0.04% / 10.86%
||
7 Day CHG~0.00%
Published-23 May, 2024 | 13:04
Updated-01 Aug, 2024 | 21:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper access control vulnerability in Prodys Quantum Audio codec

Improper access control vulnerability in Prodys' Quantum Audio codec affecting versions 2.3.4t and below. This vulnerability could allow an unauthenticated user to bypass authentication entirely and execute arbitrary API requests against the web application.

Action-Not Available
Vendor-Prodysprodys
Product-Quantum Audio codecquantum_audio_codec
CWE ID-CWE-284
Improper Access Control
CVE-2023-47031
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 35.55%
||
7 Day CHG~0.00%
Published-23 Jun, 2025 | 00:00
Updated-24 Jun, 2025 | 17:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to escalate privileges via a crafted POST request to the grantRolesToUsers, grantRolesToGroups, and grantRolesToOrganization SOAP API component.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-284
Improper Access Control
CVE-2023-46249
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.7||CRITICAL
EPSS-0.46% / 63.07%
||
7 Day CHG~0.00%
Published-31 Oct, 2023 | 15:20
Updated-05 Sep, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
authentik potential installation takeover when default admin user is deleted

authentik is an open-source Identity Provider. Prior to versions 2023.8.4 and 2023.10.2, when the default admin user has been deleted, it is potentially possible for an attacker to set the password of the default admin user without any authentication. authentik uses a blueprint to create the default admin user, which can also optionally set the default admin users' password from an environment variable. When the user is deleted, the `initial-setup` flow used to configure authentik after the first installation becomes available again. authentik 2023.8.4 and 2023.10.2 fix this issue. As a workaround, ensure the default admin user (Username `akadmin`) exists and has a password set. It is recommended to use a very strong password for this user, and store it in a secure location like a password manager. It is also possible to deactivate the user to prevent any logins as akadmin.

Action-Not Available
Vendor-goauthentikgoauthentikgoauthentik
Product-authentikauthentikauthentik
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-5504
Matching Score-4
Assigner-NetApp, Inc.
ShareView Details
Matching Score-4
Assigner-NetApp, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.24% / 78.43%
||
7 Day CHG~0.00%
Published-24 Sep, 2019 | 19:53
Updated-04 Aug, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ONTAP Select Deploy administration utility versions 2.12 & 2.12.1 ship with an HTTP service bound to the network allowing unauthenticated remote attackers to perform administrative actions.

Action-Not Available
Vendor-n/aNetApp, Inc.
Product-ontap_select_deploy_administration_utilityONTAP Select Deploy administration utility
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2017-6409
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.53% / 66.19%
||
7 Day CHG~0.00%
Published-02 Mar, 2017 | 06:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Veritas NetBackup 8.0 and earlier and NetBackup Appliance 3.0 and earlier. Unauthenticated CORBA interfaces permit inappropriate access.

Action-Not Available
Vendor-n/aVeritas Technologies LLC
Product-netbackup_appliancenetbackupn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-4699
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-10||CRITICAL
EPSS-0.91% / 74.93%
||
7 Day CHG~0.00%
Published-06 Nov, 2023 | 05:02
Updated-17 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Command Execution Vulnerability in Mitsubishi Electric proprietary protocol communication of multiple FA products

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC-F Series CPU modules, MELSEC iQ-F Series, MELSEC iQ-R series CPU modules, MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series, MELSEC-L series, Mitsubishi Electric CNC M800V/M80V series, Mitsubishi Electric CNC M800/M80/E80 series and Mitsubishi Electric CNC M700V/M70V/E70 series allows a remote unauthenticated attacker to execute arbitrary commands by sending specific packets to the affected products. This could lead to disclose or tamper with information by reading or writing control programs, or cause a denial-of-service (DoS) condition on the products by resetting the memory contents of the products to factory settings or resetting the products remotely.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-fx3u-64mr\/ds_firmwarefx3uc-32mt-lt-2fx3u-128mt\/ess_firmwarefx3u-48mt\/es-a_firmwarefx5u-64mr\/dsfx3u-32ms\/esfx3g-14mt\/es-afx3s-10mr\/es_firmwarefx5uj-24mt\/es-a_firmwarefx3ge-24mt\/dsfx3u-64mr\/ua1fx3u-16mr\/es_firmwarefx5uc-64mt\/d_firmwarefx3u-80mt\/dsfx3ge-40mt\/dssfx3u-48mt\/dsfx3u-80mr\/es_firmwarefx5uj-24mr\/ds_firmwarefx3u-64mr\/es_firmwarefx3g-24mr\/es-a_firmwarefx3u-16mr\/es-afx3u-128mt\/es-afx5u-80mt\/dss_firmwarefx5u-32mt\/ess_firmwarefx3s-14mt\/esfx5u-32mt\/ds_firmwarefx3g-60mt\/es_firmwarefx5uj-40mr\/es-afx5uj-60mt\/dsfx3uc-96mt\/dfx5s-30mt\/ess_firmwarefx3s-30mt\/esfx3g-24mt\/ds_firmwarefx3ge-24mt\/ds_firmwarefx5u-64mt\/dss_firmwarefx5u-80mr\/dsfx5uc-32mt\/ds-ts_firmwarefx3uc-64mt\/dssfx3u-64mt\/esfx3g-24mt\/es-afx3ge-40mr\/dsfx5s-80mr\/es_firmwarefx3s-30mr\/es-2adfx5s-60mt\/ess_firmwarefx3g-24mt\/dss_firmwarefx5uj-24mt\/dss_firmwarefx3s-30mr\/ds_firmwarefx3u-16mt\/es_firmwarefx3sa-30mr-cm_firmwarefx3gc-32mt\/d_firmwarefx3ge-24mt\/dssfx3ga-24mr-cmfx3uc-96mt\/dss_firmwarefx5uc-32mt\/ds-tsfx3u-16mt\/dss_firmwarefx3g-14mr\/es-afx3sa-10mr-cmfx3g-60mt\/dssfx3s-14mt\/es_firmwarefx3g-40mt\/es-afx5uj-24mr\/es_firmwarefx5uj-24mr\/esfx3uc-32mt-lt_firmwarefx3ga-24mr-cm_firmwarefx5uj-24mt\/essfx5s-60mr\/esfx5uc-32mt\/dss_firmwarefx3uc-32mt\/dfx3uc-16mt\/dss-p4fx3sa-10mt-cmfx5s-60mt\/essfx5u-80mr\/esfx3g-40mt\/dsfx5u-80mt\/dssfx3g-60mr\/es-a_firmwarefx3s-20mt\/ds_firmwarefx3u-128mt\/es-a_firmwarefx3uc-32mt\/dss_firmwarefx3ge-24mt\/dss_firmwarefx3uc-16mt\/d_firmwarefx3g-40mt\/essfx5uj-24mr\/es-a_firmwarefx3u-16mr\/es-a_firmwarefx3g-14mt\/ess_firmwarefx3u-48mt\/dss_firmwarefx3s-20mt\/dssfx5uj-60mt\/esfx5uc-96mt\/dssfx3u-16mt\/ess_firmwarefx3g-40mt\/dssfx5uj-40mt\/dsfx3u-32mr\/es_firmwarefx3ge-24mr\/esfx3sa-14mr-cmfx3u-128mr\/es-afx3g-14mr\/es_firmwarefx5uj-60mr\/es-a_firmwarefx3ge-24mt\/es_firmwarefx3g-14mt\/dss_firmwarefx3ge-24mt\/ess_firmwarefx3u-64mt\/dsfx5u-80mt\/ess_firmwarefx3g-14mt\/ds_firmwarefx3u-80mt\/es-afx3gc-32mt\/dss_firmwarefx3u-48mr\/es_firmwarefx3g-40mr\/dsfx3uc-64mt\/dss_firmwarefx3u-128mr\/ds_firmwarefx3s-30mt\/es-2ad_firmwarefx3u-64mr\/es-afx3sa-20mt-cm_firmwarefx3s-10mr\/esfx3s-10mt\/ess_firmwarefx3u-80mt\/ds_firmwarefx5u-64mt\/dssfx5s-40mt\/esfx3s-20mr\/esfx3u-80mt\/dssfx3u-16mr\/esfx3g-60mt\/essfx5u-64mt\/dsfx3s-14mt\/dssfx3g-24mt\/essfx3ge-24mt\/essfx3s-14mr\/ds_firmwarefx5u-80mt\/dsfx5uc-96mt\/d_firmwarefx5uc-64mt\/dfx3ge-40mt\/dss_firmwarefx3g-60mr\/esfx3g-40mr\/es_firmwarefx5uj-40mt\/ess_firmwarefx3u-48mt\/dssfx3ge-40mt\/dsfx3ge-40mr\/ds_firmwarefx3g-24mt\/esfx3uc-16mr\/d-tfx3s-10mt\/dsfx5uj-24mt\/es-afx5u-32mt\/esfx3s-30mt\/ess-2adfx3g-60mr\/es_firmwarefx3ga-40mr-cmfx3sa-14mt-cmfx3u-128mt\/dsfx3u-32mt\/dsfx5uj-60mr\/ds_firmwarefx3u-64ms\/esfx3s-10mt\/esfx3ge-40mr\/esfx5uj-60mt\/dss_firmwarefx3s-10mt\/essfx5s-80mt\/es_firmwarefx3g-40mt\/esfx5u-32mt\/dsfx3u-64mr\/ua1_firmwarefx3u-64mt\/ds_firmwarefx3u-128mt\/dssfx3ge-40mt\/essfx3sa-20mr-cm_firmwarefx5s-80mt\/ess_firmwarefx3ge-24mr\/ds_firmwarefx3u-48mt\/ds_firmwarefx3uc-32mt-ltfx3u-32mt\/essfx3u-32mr\/ds_firmwarefx5uj-60mt\/es-a_firmwarefx5s-80mt\/essfx3g-24mt\/ess_firmwarefx3g-60mt\/dss_firmwarefx3sa-10mr-cm_firmwarefx3u-128mt\/essfx3u-16mt\/esfx3u-32mt\/es-a_firmwarefx5u-32mt\/es_firmwarefx3u-80mr\/es-a_firmwarefx3g-60mr\/ds_firmwarefx3s-20mt\/dsfx3ge-24mr\/dsfx3ga-60mt-cm_firmwarefx5uj-60mr\/es-afx3s-30mr\/es_firmwarefx5s-30mr\/es_firmwarefx3u-32mr\/dsfx3u-64mt\/es-a_firmwarefx3s-30mt\/ess-2ad_firmwarefx5s-40mr\/es_firmwarefx5s-40mt\/essfx3u-16mt\/ds_firmwarefx5u-80mr\/es_firmwarefx3ga-60mt-cmfx5uc-32mt\/d_firmwarefx3g-14mt\/esfx3sa-14mt-cm_firmwarefx3ge-40mt\/ess_firmwarefx3sa-14mr-cm_firmwarefx5uj-40mt\/dss_firmwarefx3s-10mr\/ds_firmwarefx3g-24mr\/es_firmwarefx3uc-16mr\/d-t_firmwarefx3g-14mt\/es_firmwarefx3s-14mt\/ess_firmwarefx3g-24mr\/dsfx5u-32mt\/essfx5uj-60mt\/ess_firmwarefx3u-64mt\/essfx3s-30mt\/dsfx3g-24mt\/es-a_firmwarefx5uc-32mr\/ds-tsfx3u-32mt\/ess_firmwarefx3g-60mt\/ess_firmwarefx3g-24mt\/dssfx5u-80mt\/es_firmwarefx3s-30mr\/es-2ad_firmwarefx5uj-40mr\/dsfx3u-48mt\/ess_firmwarefx5s-30mt\/esfx3u-64mt\/dss_firmwarefx3uc-64mt\/dfx3u-80mt\/dss_firmwarefx3g-14mt\/dssfx3g-14mr\/es-a_firmwarefx5s-40mt\/ess_firmwarefx3s-14mr\/esfx5uj-40mt\/es_firmwarefx3s-20mt\/ess_firmwarefx3uc-16mt\/d-p4_firmwarefx3sa-30mt-cmfx3uc-96mt\/d_firmwarefx5uj-24mt\/ess_firmwarefx5uj-24mt\/es_firmwarefx3g-40mt\/es_firmwarefx3g-60mr\/es-afx5u-80mt\/ds_firmwarefx3u-128mr\/es-a_firmwarefx5s-30mt\/essfx3u-64mt\/dssfx3g-14mr\/esfx5s-30mr\/esfx3s-20mr\/dsfx5u-32mr\/es_firmwarefx5uj-40mt\/es-afx3uc-16mt\/dssfx3ga-60mr-cm_firmwarefx3u-48mr\/ds_firmwarefx3s-10mt\/dssfx5s-40mr\/esfx5s-30mt\/es_firmwarefx3u-16mr\/dsfx3ga-40mt-cmfx5uj-40mr\/ds_firmwarefx3s-30mt\/dssfx3u-80mt\/esfx3s-14mr\/dsfx3u-80mt\/ess_firmwarefx3sa-30mr-cmfx5uj-24mt\/dsfx3g-24mr\/es-afx3u-32mr\/es-a_firmwarefx3u-128mr\/esfx3g-60mt\/esfx5uj-60mr\/es_firmwarefx3u-16mt\/dssfx5uj-24mt\/dssfx3u-32mr\/esfx3s-30mr\/esfx3u-64mt\/es_firmwarefx3g-40mt\/dss_firmwarefx5u-64mt\/ess_firmwarefx3u-16mt\/essfx3s-20mt\/essfx3u-128mt\/efx5uc-32mt\/dss-ts_firmwarefx3u-48mt\/essfx3uc-32mt\/d_firmwarefx3ga-60mr-cmfx3g-60mt\/es-afx3u-32mr\/ua1_firmwarefx3u-32mt\/es_firmwarefx3uc-16mt\/dfx3ga-24mt-cmfx3ge-40mt\/es_firmwarefx3g-24mr\/esfx5uj-40mr\/es_firmwarefx3g-60mt\/dsfx5uj-60mt\/es-afx3s-10mt\/ds_firmwarefx5u-64mt\/es_firmwarefx3u-32mt\/es-afx3ge-40mt\/ds_firmwarefx3s-10mt\/es_firmwarefx3gc-32mt\/dfx3u-32mr\/es-afx5uj-24mr\/dsfx5u-80mt\/essfx3u-64ms\/es_firmwarefx3s-30mt\/ds_firmwarefx5u-64mt\/essfx3u-32mt\/dss_firmwarefx3u-16mt\/dsfx5uj-24mr\/es-afx3g-60mr\/dsfx5u-64mr\/ds_firmwarefx5s-80mr\/esfx3s-20mr\/ds_firmwarefx3sa-20mt-cmfx3uc-16mr\/ds-t_firmwarefx3u-48mr\/es-a_firmwarefx3g-14mt\/dsfx5uc-64mt\/dssfx3u-32ms\/es_firmwarefx3g-40mr\/es-afx3ge-24mt\/esfx3s-14mt\/dss_firmwarefx5uj-60mr\/dsfx3g-14mt\/es-a_firmwarefx5uj-24mt\/ds_firmwarefx3sa-30mt-cm_firmwarefx3u-80mr\/esfx3g-40mt\/ess_firmwarefx3u-64mt\/ess_firmwarefx3u-80mt\/essfx5uj-60mt\/es_firmwarefx3uc-32mt\/dssfx3g-40mr\/es-a_firmwarefx3ge-40mt\/esfx3s-14mt\/dsfx5uc-64mt\/dss_firmwarefx5uj-40mt\/ds_firmwarefx5s-80mt\/esfx3u-48mr\/es-afx3s-30mt\/dss_firmwarefx3gc-32mt\/dssfx3s-10mr\/dsfx5u-64mt\/ds_firmwarefx3ge-40mr\/es_firmwarefx5uj-40mt\/essfx5uc-32mt\/dssfx3u-16mt\/es-afx3u-80mt\/es-a_firmwarefx3u-16mt\/es-a_firmwarefx3uc-16mt\/d-p4fx3u-128mt\/dss_firmwarefx3g-40mt\/ds_firmwarefx3ge-24mr\/es_firmwarefx3u-32mr\/ua1fx3g-14mr\/ds_firmwarefx3g-60mt\/es-a_firmwarefx3g-60mt\/ds_firmwarefx5uj-40mt\/es-a_firmwarefx5u-64mt\/esfx3u-48mt\/es_firmwarefx3uc-16mt\/dss-p4_firmwarefx3u-80mr\/es-afx3s-14mr\/es_firmwarefx5u-32mr\/esfx3g-14mr\/dsfx3ga-40mt-cm_firmwarefx3u-80mr\/ds_firmwarefx3u-48mt\/esfx5uj-60mt\/dssfx5uj-40mt\/dssfx3s-20mr\/es_firmwarefx5uj-60mr\/esfx3s-30mt\/ess_firmwarefx3u-32mt\/esfx3sa-20mr-cmfx3ga-24mt-cm_firmwarefx3sa-10mt-cm_firmwarefx3u-48mr\/dsfx3u-64mr\/dsfx3u-80mr\/dsfx5uc-32mt\/dss-tsfx5uj-40mt\/esfx3u-64mr\/es-a_firmwarefx3s-30mt\/essfx3g-40mr\/esfx5u-64mr\/esfx3u-48mt\/es-afx5uc-32mr\/ds-ts_firmwarefx3uc-32mt-lt-2_firmwarefx3u-32mt\/ds_firmwarefx3u-128mt\/ds_firmwarefx3g-24mr\/ds_firmwarefx3u-64mt\/es-afx3g-14mt\/essfx3s-20mt\/dss_firmwarefx3s-14mt\/essfx3g-24mt\/es_firmwarefx3uc-16mt\/dss_firmwarefx3g-24mt\/dsfx5u-32mr\/dsfx5uj-60mt\/ds_firmwarefx5s-60mr\/es_firmwarefx5u-80mt\/esfx3u-128mr\/es_firmwarefx3u-16mr\/ds_firmwarefx3s-20mt\/esfx5u-32mt\/dss_firmwarefx5uj-24mt\/esfx3uc-16mr\/ds-tfx3s-30mr\/dsfx5uj-40mr\/es-a_firmwarefx3u-128mr\/dsfx3s-14mt\/ds_firmwarefx5s-60mt\/es_firmwarefx3u-80mt\/es_firmwarefx5uj-40mr\/esfx3uc-64mt\/d_firmwarefx3uc-96mt\/dssfx3u-48mr\/esfx5s-60mt\/esfx3s-30mt\/es_firmwarefx5u-64mr\/es_firmwarefx3u-64mr\/esfx5uc-32mt\/dfx5u-32mr\/ds_firmwarefx3s-10mt\/dss_firmwarefx5uc-96mt\/dfx3s-20mt\/es_firmwarefx3u-32mt\/dssfx3s-30mt\/es-2adfx5uj-60mt\/essfx3g-40mt\/es-a_firmwarefx3ga-40mr-cm_firmwarefx5uc-96mt\/dss_firmwarefx5s-40mt\/es_firmwarefx5u-80mr\/ds_firmwarefx3g-40mr\/ds_firmwarefx3u-128mt\/e_firmwarefx5u-32mt\/dssMELSEC-F Series FX3G-40MT/ESSMELSEC iQ-F Series FX5U-32MT/ESSMELSEC-F Series FX3U-64MT/ESMELSEC iQ-R Series RD77MS4MELSEC iQ-F Series FX5S-30MT/ESMELSEC-F Series FX3U-32MR/UA1MELSEC-F Series FX3S-10MT/DSSMELSEC-F Series FX3UC-16MT/DMELSEC-F Series FX3S-14MR/DSMELSEC-F Series FX3GA-60MT-CMMELSEC-F Series FX3G-60MT/DSSMitsubishi Electric CNC M700V Series M750VSMELSEC iQ-F Series FX5S-80MT/ESSMELSEC-F Series FX3GC-32MT/DSSMELSEC iQ-R Series R32ENCPUMELSEC-F Series FX3GA-60MR-CMMELSEC-F Series FX3S-10MR/DSMELSEC iQ-F Series FX5U-80MT/DSMELSEC-F Series FX3UC-16MT/D-P4MELSEC-F Series FX3U-48MT/ESSMELSEC-F Series FX3U-32MT/ES-AMELSEC-F Series FX3U-16MT/DSMELSEC-F Series FX3U-128MR/ESMELSEC-F Series FX3GE-40MT/DSMELSEC Q Series Q172DSCPUMELSEC iQ-F Series FX5U-80MR/DSMELSEC-F Series FX3S-10MT/ESMELSEC-F Series FX3U-32MT/DSSMELSEC iQ-F Series FX5UJ-24MT/ES-AMELSEC-F Series FX3G-60MR/ESMELSEC-F Series FX3SA-10MT-CMMELSEC iQ-F Series FX5S-60MT/ESSMELSEC iQ-F Series FX5UJ-40MT/ESMELSEC L Series LD77MS2MELSEC-F Series FX3UC-16MR/DS-TMELSEC-F Series FX3G-60MT/ESMELSEC-F Series FX3SA-30MT-CMMELSEC-F Series FX3S-20MT/ESSMELSEC iQ-R Series R16PCPUMELSEC iQ-R Series R16MTCPUMELSEC-F Series FX3G-40MT/ES-AMELSEC iQ-F Series FX5UJ-24MR/ESMELSEC iQ-F Series FX5S-30MT/ESSMELSEC iQ-R Series RD78G4MELSEC-F Series FX3S-14MT/ESMELSEC iQ-F Series FX5UJ-60MT/ESMELSEC-F Series FX3S-20MR/DSMELSEC-F Series FX3U-80MT/DSSMELSEC-F Series FX3S-20MT/DSMELSEC iQ-F Series FX5U-64MR/DSMELSEC-F Series FX3U-128MT/ESSMELSEC-F Series FX3U-48MT/DSSMELSEC iQ-F Series FX5UJ-40MT/ESSMELSEC iQ-R Series R120ENCPUMELSEC iQ-F Series FX5UC-64MT/DMELSEC-F Series FX3GE-24MT/ESMELSEC-F Series FX3SA-10MR-CMMELSEC-F Series FX3SA-30MR-CMMELSEC-F Series FX3U-64MR/ES-AMELSEC iQ-R Series RD78G8Mitsubishi Electric CNC M700V Series M730VSMELSEC-F Series FX3S-20MT/DSSMELSEC L Series LD77MS4MELSEC-F Series FX3UC-32MT-LT-2Mitsubishi Electric CNC M700V Series M730VWMELSEC iQ-R Series R08PCPUMitsubishi Electric CNC M80 Series M80MELSEC-F Series FX3U-64MR/DSMELSEC iQ-R Series R120CPUMELSEC-F Series FX3U-16MT/ES-AMELSEC-F Series FX3S-30MT/DSMELSEC iQ-F Series FX5UJ-24MT/DSMELSEC iQ-F Series FX5UJ-60MR/ESMELSEC iQ-F Series FX5-40SSC-GMELSEC iQ-R Series RD77GF32MELSEC-F Series FX3S-30MR/DSMELSEC-F Series FX3GA-24MT-CMMELSEC iQ-R Series R120PCPUMELSEC-F Series FX3S-30MT/ES-2ADMELSEC L Series LD77MS16MELSEC-F Series FX3U-80MT/ES-AMELSEC iQ-F Series FX5S-60MR/ESMELSEC iQ-R Series R04ENCPUMELSEC iQ-R Series R32MTCPUMELSEC-F Series FX3UC-16MT/DSSMELSEC-F Series FX3U-16MR/DSMELSEC-F Series FX3G-60MR/ES-AMELSEC iQ-F Series FX5S-30MR/ESMELSEC-F Series FX3S-20MT/ESMELSEC-F Series FX3S-30MT/ESS-2ADMELSEC-F Series FX3S-30MR/ESMitsubishi Electric CNC M800 Series M800SMELSEC iQ-F Series FX5UC-32MR/DS-TSMELSEC iQ-F Series FX5UJ-40MT/DSSMELSEC Q Series QD77MS16MELSEC Q Series QD77MS2MELSEC-F Series FX3G-14MT/ES-AMitsubishi Electric CNC M70V Series M70VMELSEC-F Series FX3G-24MT/DSSMELSEC-F Series FX3G-14MR/ES-AMELSEC iQ-F Series FX5UJ-40MR/DSMELSEC-F Series FX3G-14MT/DSMELSEC iQ-F Series FX5UC-32MT/DSS-TSMELSEC iQ-F Series FX5U-80MT/ESSMELSEC-F Series FX3G-40MT/DSMELSEC iQ-F Series FX5UJ-60MT/ES-AMELSEC-F Series FX3U-32MS/ESMELSEC iQ-F Series FX5UJ-40MR/ES-AMELSEC iQ-F Series FX5UJ-24MT/ESMELSEC-F Series FX3G-40MR/ES-AMELSEC iQ-F Series FX5UJ-60MT/ESSMELSEC iQ-F Series FX5S-80MR/ESMELSEC-F Series FX3U-32MR/ESMitsubishi Electric CNC M800V Series M800VWMELSEC-F Series FX3S-14MT/DSSMELSEC-F Series FX3U-128MR/ES-AMELSEC iQ-F Series FX5U-64MT/ESMELSEC-F Series FX3S-14MT/DSMELSEC-F Series FX3U-48MT/ESMELSEC-F Series FX3GE-40MT/ESSMELSEC-F Series FX3U-16MT/DSSMELSEC iQ-F Series FX5S-40MT/ESSMELSEC iQ-F Series FX5UJ-24MR/ES-AMELSEC-F Series FX3U-16MT/ESSMELSEC-F Series FX3G-40MT/DSSMELSEC iQ-R Series RD77MS2MELSEC-F Series FX3UC-16MT/DSS-P4MELSEC iQ-F Series FX5UC-96MT/DMELSEC-F Series FX3G-24MT/DSMELSEC-F Series FX3S-14MT/ESSMELSEC iQ-F Series FX5-40SSC-SMELSEC iQ-R Series RD78G64MELSEC-F Series FX3U-48MR/ESMELSEC-F Series FX3S-14MR/ESMELSEC-F Series FX3G-14MT/DSSMitsubishi Electric CNC E70 Series E70MELSEC iQ-F Series FX5U-32MT/DSMELSEC Q Series QD77GF8MELSEC-F Series FX3U-16MR/ESMELSEC-F Series FX3S-10MR/ESMELSEC iQ-F Series FX5U-80MT/DSSMELSEC iQ-F Series FX5UJ-40MR/ESMELSEC-F Series FX3S-30MT/ESSMELSEC-F Series FX3UC-96MT/DSSMELSEC iQ-R Series R16ENCPUMELSEC iQ-F Series FX5U-80MT/ESMELSEC-F Series FX3S-30MR/ES-2ADMELSEC-F Series FX3G-24MT/ESMELSEC iQ-L Series LD78G16MELSEC iQ-F Series FX5U-32MR/DSMELSEC-F Series FX3U-48MT/ES-AMELSEC iQ-R Series RD77GF8MELSEC-F Series FX3GA-40MT-CMMitsubishi Electric CNC M700V Series M720VSMELSEC iQ-F Series FX5UJ-60MR/ES-AMELSEC-F Series FX3U-48MR/ES-AMELSEC-F Series FX3G-14MR/ESMELSEC-F Series FX3U-80MT/ESMELSEC-F Series FX3U-48MT/DSMELSEC-F Series FX3U-64MT/ESSMELSEC-F Series FX3U-128MT/ESMELSEC-F Series FX3G-24MR/ES-AMELSEC-F Series FX3GC-32MT/DMELSEC Q Series QD77GF4MELSEC-F Series FX3UC-64MT/DMitsubishi Electric CNC M700V Series M750VWMELSEC-F Series FX3S-10MT/ESSMELSEC-F Series FX3GE-24MT/DSMELSEC-F Series FX3S-30MT/ESMELSEC-F Series FX3GE-40MT/DSSMELSEC-F Series FX3G-40MR/DSMELSEC-F Series FX3SA-14MR-CMMELSEC iQ-F Series FX5UC-32MT/DSSMELSEC-F Series FX3U-128MR/DSMELSEC-F Series FX3GE-24MT/DSSMELSEC-F Series FX3GA-24MR-CMMELSEC-F Series FX3G-24MR/DSMELSEC iQ-F Series FX5UJ-40MT/ES-AMELSEC-F Series FX3S-20MR/ESMELSEC-F Series FX3U-64MR/ESMELSEC-F Series FX3U-48MR/DSMELSEC-F Series FX3SA-14MT-CMMitsubishi Electric CNC M80V Series M80VMELSEC-F Series FX3U-80MR/ES-AMELSEC-F Series FX3U-128MT/DSMELSEC-F Series FX3G-24MT/ESSMELSEC Q Series QD77GF16MELSEC-F Series FX3U-16MR/ES-AMELSEC-F Series FX3GE-40MR/DSMELSEC iQ-R Series RD77GF4MELSEC iQ-F Series FX5U-32MR/ESMELSEC iQ-L Series LD78G4MELSEC-F Series FX3G-60MT/ESSMELSEC-F Series FX3S-10MT/DSMELSEC iQ-F Series FX5UJ-24MT/ESSMELSEC iQ-R Series RD77GF16MELSEC-F Series FX3G-40MT/ESMELSEC Q Series QD77MS4MELSEC-F Series FX3UC-64MT/DSSMELSEC-F Series FX3G-60MT/ES-AMELSEC-F Series FX3G-14MT/ESMELSEC-F Series FX3GE-24MR/DSMELSEC-F Series FX3U-32MR/DSMELSEC iQ-F Series FX5U-32MT/DSSMELSEC-F Series FX3U-32MT/DSMELSEC iQ-F Series FX5U-32MT/ESMELSEC-F Series FX3U-32MR/ES-AMELSEC-F Series FX3SA-20MR-CMMELSEC iQ-F Series FX5S-80MT/ESMELSEC iQ-R Series R32CPUMELSEC-F Series FX3G-60MT/DSMELSEC iQ-F Series FX5UJ-60MT/DSMitsubishi Electric CNC M800V Series M800VSMELSEC-F Series FX3U-80MR/DSMELSEC-F Series FX3U-64MT/DSSMELSEC-F Series FX3G-40MR/ESMELSEC-F Series FX3UC-16MR/D-TMELSEC-F Series FX3GE-40MT/ESMELSEC iQ-R Series RD78GHWMELSEC-F Series FX3SA-20MT-CMMELSEC iQ-F Series FX5S-40MT/ESMELSEC iQ-F Series FX5-80SSC-GMitsubishi Electric CNC M700V Series M720VWMELSEC-F Series FX3U-80MT/DSMELSEC iQ-F Series FX5U-64MT/ESSMELSEC-F Series FX3UC-96MT/DMELSEC iQ-R Series RD78G32MELSEC iQ-R Series RD78GHVMELSEC iQ-F Series FX5UC-96MT/DSSMELSEC iQ-R Series RD77MS16MELSEC-F Series FX3G-24MT/ES-AMELSEC iQ-F Series FX5U-64MT/DSMELSEC-F Series FX3U-128MT/ES-AMELSEC iQ-F Series FX5UC-32MT/DS-TSMELSEC-F Series FX3U-16MT/ESMELSEC iQ-R Series R16CPUMELSEC iQ-F Series FX5U-64MR/ESMELSEC iQ-F Series FX5UJ-24MR/DSMELSEC-F Series FX3U-32MT/ESSMELSEC iQ-R Series RD77MS8MELSEC iQ-R Series RD78G16Mitsubishi Electric CNC M80 Series M80WMitsubishi Electric CNC E80 Series E80MELSEC iQ-F Series FX5U-80MR/ESMitsubishi Electric CNC M80V Series M80VWMELSEC iQ-F Series FX5UC-64MT/DSSMELSEC-F Series FX3U-80MT/ESSMELSEC-F Series FX3GE-24MR/ESMELSEC-F Series FX3S-30MT/DSSMELSEC iQ-F Series FX5UJ-24MT/DSSMELSEC-F Series FX3G-24MR/ESMELSEC iQ-F Series FX5UJ-40MT/DSMELSEC iQ-F Series FX5UC-32MT/DMELSEC-F Series FX3U-32MT/ESMELSEC-F Series FX3GE-24MT/ESSMELSEC Q Series Q170MSCPUMELSEC iQ-R Series R04CPUMELSEC-F Series FX3G-14MR/DSMELSEC iQ-F Series FX5S-60MT/ESMELSEC iQ-R Series R08CPUMELSEC iQ-F Series FX5UJ-60MR/DSMELSEC-F Series FX3G-14MT/ESSMELSEC-F Series FX3UC-32MT/DMELSEC-F Series FX3U-80MR/ESMELSEC-F Series FX3U-128MT/DSSMELSEC-F Series FX3GA-40MR-CMMELSEC iQ-F Series FX5U-64MT/DSSMitsubishi Electric CNC M800 Series M800WMELSEC Q Series Q173DSCPUMELSEC iQ-R Series R32PCPUMELSEC iQ-F Series FX5-80SSC-SMELSEC-F Series FX3U-64MR/UA1MELSEC-F Series FX3UC-32MT/DSSMELSEC iQ-R Series R08ENCPUMELSEC-F Series FX3UC-32MT-LTMELSEC-F Series FX3GE-40MR/ESMELSEC-F Series FX3U-64MS/ESMELSEC-F Series FX3U-64MT/DSMELSEC iQ-R Series R64MTCPUMELSEC-F Series FX3G-60MR/DSMELSEC iQ-F Series FX5S-40MR/ESMELSEC-F Series FX3U-64MT/ES-AMELSEC iQ-F Series FX5UJ-60MT/DSS
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-50487
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-9.8||CRITICAL
EPSS-0.37% / 57.98%
||
7 Day CHG+0.04%
Published-28 Oct, 2024 | 11:17
Updated-31 Oct, 2024 | 00:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress MaanStore API plugin <= 1.0.1 - Account Takeover vulnerability

Authentication Bypass Using an Alternate Path or Channel vulnerability in MaanTheme MaanStore API allows Authentication Bypass.This issue affects MaanStore API: from n/a through 1.0.1.

Action-Not Available
Vendor-maanthemeMaanThememaantheme
Product-maanstore_apiMaanStore APImaanstore_api
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-50477
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-9.8||CRITICAL
EPSS-74.08% / 98.78%
||
7 Day CHG~0.00%
Published-28 Oct, 2024 | 11:23
Updated-31 Oct, 2024 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Stacks Mobile App Builder plugin <= 5.2.3 - Account Takeover vulnerability

Authentication Bypass Using an Alternate Path or Channel vulnerability in Stacks Stacks Mobile App Builder stacks-mobile-app-builder allows Authentication Bypass.This issue affects Stacks Mobile App Builder: from n/a through 5.2.3.

Action-Not Available
Vendor-stacksmarketStacksstacks
Product-stacks_mobile_app_builderStacks Mobile App Builderstacks_mobile_app_builder
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-6140
Matching Score-4
Assigner-Forcepoint
ShareView Details
Matching Score-4
Assigner-Forcepoint
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 60.36%
||
7 Day CHG~0.00%
Published-09 Apr, 2019 | 20:51
Updated-04 Aug, 2024 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A configuration issue has been discovered in Forcepoint Email Security 8.4.x and 8.5.x: the product is left in a vulnerable state if the hybrid registration process is not completed.

Action-Not Available
Vendor-forcepointForcepoint
Product-email_securityForcepoint Email Security
CWE ID-CWE-284
Improper Access Control
CVE-2021-44259
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.04% / 76.57%
||
7 Day CHG~0.00%
Published-17 Mar, 2022 | 12:13
Updated-04 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability is in the 'wx.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote attacker to access this page without any authentication. When an unauthorized user accesses this page directly, it connects to this device as a friend of the device owner.

Action-Not Available
Vendor-n/aWAVLINK Technology Ltd.
Product-wl-wn531g3wl-wn531g3_firmwaren/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-47406
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.1||CRITICAL
EPSS-0.36% / 57.50%
||
7 Day CHG+0.04%
Published-25 Oct, 2024 | 06:18
Updated-05 Nov, 2024 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.

Action-Not Available
Vendor-toshibatecsharpSharp CorporationToshiba Tec Corporationtoshibatecsharp
Product-mx-m6050bp-c542wd_firmwaremx-5110n_firmwaremx-c381_firmwaremx-m6070_abp-b547wdmx-m365n_a_firmwaremx-3570n_firmwaremx-m6071_firmwarebp-60c36_firmwarebp-70m31bp-90c80bp-c533wd_firmwaremx-c400p_firmwaremx-3101nmx-4070n_a_firmwaremx-3070v_amx-m3571_firmwaremx-m3571mx-2651_firmwaremx-m464n_firmwaremx-m2651mx-5070v_firmwaremx-3111umx-b355wz_firmwaremx-4140nmx-4060v_firmwarebp-b550wdmx-5140n_firmwaremx-m5051mx-3050v_amx-b376w_firmwaremx-2600gmx-c303wh_firmwarebp-70c55_firmwaremx-2601nmx-m564n_amx-b376whmx-4071s_firmwaremx-3550v_firmwaremx-m3071_firmwaremx-b456whmx-m356uvmx-c311mx-m904bp-50c26mx-m753u_firmwaremx-m264ue-studio1058_firmwaremx-2640nrmx-m315nmx-b400pmx-2314nrbp-30c25z_firmwaremx-3550n_firmwaredx-c401_j_firmwaremx-m315u_firmwaremx-c303mx-2610nmx-m316nvmx-m314nmx-m4070_amx-b476wh_firmwaremx-m6070_firmwarebp-30m28t_firmwaremx-m4070mx-m453u_firmwaremx-m1206_firmwaremx-m265nv_firmwaremx-m3070_firmwaremx-3100gmx-m265ne_firmwaremx-c401_firmwaremx-m315uv_firmwaremx-3070v_firmwaremx-b355wt_firmwaremx-m1055bp-c535wrmx-m623umx-2610n_firmwaremx-m264u_firmwaremx-m314nr_firmwaremx-7040nmx-3571smx-m4071s_firmwaremx-m3551bp-70c55mx-m354n_firmwaremx-c312_firmwaremx-4111n_firmwaree-studio908_firmwaremx-c380mx-m265uvmx-c402sc_firmwarebp-90c80_firmwaredx-c400mx-b356whmx-m315ne_firmwaremx-1810umx-6050v_firmwaremx-4070v_firmwaremx-m754nmx-2615n_firmwarebp-70m75_firmwaremx-2615nmx-4071smx-5000nmx-c303w_firmwaredx-c400_firmwaremx-6580nmx-c304wh_firmwaremx-m365n_abp-50c65_firmwaremx-m7570mx-3060nmx-3610nrmx-b376wmx-7081_firmwarebp-70m36_firmwarebp-50c55_firmwaremx-3110nmx-m1205mx-b402pmx-m4050_firmwaremx-c382scmx-c310_firmwaremx-m503nmx-3115nmx-m565nmx-3070v_a_firmwaredx-2000u_firmwaremx-m1056mx-m3551_firmwaremx-m3051_firmwaremx-m264nr_firmwaremx-m453nmx-c303whmx-2630nmx-m6071mx-c380p_firmwaremx-3050n_abp-70c65bp-30c25tbp-60c31_firmwarebp-70c36_firmwaremx-4051mx-m364nmx-3061mx-5112nmx-b402scmx-7500n_firmwaremx-m356uv_firmwaremx-3101n_firmwaremx-b382p_firmwaremx-m3550_firmwaremx-4110n_firmwaremx-b382scmx-3116n_firmwaremx-m654nbp-b537wr_firmwaremx-m354ubp-50c36mx-2601n_firmwaremx-b382_firmwaremx-3640n_firmwaremx-m6070mx-5000n_firmwaremx-m3571s_firmwaremx-3070n_amx-3640nr_firmwaremx-m3071smx-m363n_firmwaremx-8090nmx-m315uvbp-30m31_firmwaremx-2640n_firmwaremx-3551_firmwaremx-b476w_firmwaremx-m314n_firmwaremx-6071_firmwaremx-m753umx-3110n_a_firmwaremx-b355wzmx-m503umx-m6051_firmwaremx-c301wmx-c381mx-5071mx-m2651_firmwaremx-5110ne-studio1208_firmwaremx-m265v_firmwaremx-m264nmx-m363nmx-c304whmx-2600n_firmwaremx-m365n_firmwaremx-m6070_a_firmwaremx-6050vdx-c381mx-m5050_firmwaremx-3110n_firmwaremx-2614nmx-b402_firmwaremx-b382pmx-m905mx-3610nr_firmwaremx-m3570_firmwarebp-50c31mx-3561mx-m1205_firmwaremx-2600nmx-4070n_amx-c382scb_firmwarebp-b537wrbp-70c31_firmwaremx-m465n_firmwaremx-5051_firmwaremx-b455wmx-c304wmx-5071s_firmwarebp-50m26mx-4141nbp-50m26_firmwaremx-3110n_abp-50m45mx-3570v_firmwaremx-m4070_a_firmwaremx-m265n_firmwaremx-m4071smx-2615_amx-m564nmx-b382bp-c542wdmx-m265umx-c303wmx-m364n_firmwaremx-m316nv_firmwarebp-70m45bp-70m75bp-c535wdmx-6070v_a_firmwaredx-c311_firmwarebp-30m35_firmwaremx-b476whmx-m503u_firmwaremx-m754n_ae-studio1058mx-3071s_firmwaremx-2310u_firmwaremx-m354nrmx-m3550mx-4061smx-4050n_firmwaremx-4060nmx-3561s_firmwarebp-60c31mx-7090n_firmwaremx-m314umx-c380_firmwaredx-c311j_firmwaremx-4071mx-7081mx-m565n_firmwaremx-m356u_firmwaremx-3140nmx-3561_firmwaremx-m453umx-b476wmx-b381dx-c311jmx-3560vmx-m363u_firmwaremx-b455wz_firmwaremx-2616nmx-4101nmx-m5071_firmwaremx-6070n_a_firmwaremx-4071_firmwaremx-2616n_firmwarebp-30c25_firmwaremx-m356nv_firmwaremx-m5050bp-70m65_firmwaremx-m265nvmx-m314nv_firmwaremx-m266nvdx-c310_firmwaremx-5111nmx-b400p_firmwarebp-30m35mx-8081_firmwaremx-3071_firmwarebp-30m31t_firmwaremx-6580n_firmwaremx-2640nr_firmwarebp-b540wrmx-m283nmx-m5070_firmwarebp-30m28tmx-8090n_firmwarebp-c545wdmx-m264nrmx-m316nbp-c533wdmx-1810u_firmwaremx-m3071s_firmwaremx-4050v_firmwarebp-30m31mx-b355wtmx-3114nmx-2314nmx-5071_firmwaremx-b402sc_firmwaremx-m465nmx-3111u_firmwaremx-c303_firmwaremx-m365nmx-4100n_firmwaremx-7500nmx-4101n_firmwarebp-70m90_firmwarebp-90c70mx-3050nbp-60c36mx-b455wt_firmwaremx-4060n_firmwaremx-3070vmx-3050v_a_firmwarebp-50c26_firmwaremx-3570vmx-c304w_firmwaremx-m754n_firmwaremx-m465n_amx-m3050mx-6050n_firmwaremx-3610n_firmwaremx-4110nmx-5070n_firmwaremx-4140n_amx-m5070dx-c401_jmx-m356ubp-50c45_firmwaremx-4061_firmwaremx-4112n_firmwaremx-c382scbmx-3061smx-m315umx-3070n_firmwaremx-m356nvmx-3571s_firmwaremx-3560v_firmwaremx-3061_firmwaremx-m266nv_firmwarebp-30c25mx-b402mx-b455w_firmwaredx-c311mx-3571mx-7580n_firmwaremx-m314u_firmwaremx-m315nvmx-m265vmx-3100nmx-m1206mx-7090nmx-c301w_firmwaremx-3114n_firmwaremx-2600g_firmwarebp-30c25ymx-5141nmx-m4051dx-2500nmx-c301bp-50c55mx-c381bmx-2614n_firmwaremx-4070n_firmwaremx-m3570mx-m654n_firmwarebp-55c26_firmwaremx-5050n_firmwaremx-5070vmx-3140n_a_firmwaremx-m5051_firmwaremx-6071s_firmwaremx-5051mx-c400_firmwaremx-4061s_firmwaremx-3051mx-b456wh_firmwaremx-5141n_firmwaremx-b456we-studio1208mx-m3070mx-m4071_firmwaremx-3060v_firmwaremx-6071mx-4111nmx-m464nbp-30m35t_firmwaremx-m4051_firmwaremx-m6071s_firmwaremx-3140nrmx-m5071mx-2615_a_firmwaremx-4050nbp-70c31mx-m3050_firmwaremx-m4070_firmwaremx-3061s_firmwaremx-m314nrmx-3640nrmx-3070nmx-m356nmx-c301_firmwarebp-b540wr_firmwaremx-m1204mx-4070v_amx-m266n_firmwarebp-70m65mx-c380pmx-c304mx-6500ndx-c401_firmwaremx-b356wh_firmwaremx-3115n_firmwaremx-3551mx-3050v_firmwaremx-2301nbp-70c36mx-3050n_firmwaremx-m6050_firmwaremx-m905_firmwaremx-3100n_firmwaremx-6240n_firmwaremx-b401_firmwaremx-m4071bp-c535wd_firmwaremx-c400pbp-50c45mx-m7570_firmwarebp-30m31tmx-m3571smx-4100nmx-8081mx-2630n_firmwaremx-b355w_firmwarebp-70m31_firmwaremx-4112nbp-50m31mx-m453n_firmwaremx-2301n_firmwaremx-3140n_firmwaremx-m654n_a_firmwaremx-m266nmx-6070n_firmwarebp-30c25y_firmwaremx-3570nbp-70m55bp-30m28_firmwaremx-m264nvmx-5050vmx-m654n_amx-4140n_firmwaremx-5071sbp-c533wrmx-b455wtmx-m3050_a_firmwaremx-3060vmx-5001nmx-c312mx-m265uv_firmwaremx-3140nr_firmwaremx-m753n_firmwaremx-m3071mx-4060vbp-55c26mx-3071smx-3560n_firmwaremx-b455wzmx-2310rmx-m465n_a_firmwarebp-c535wr_firmwaremx-m315vmx-m316n_firmwarebp-50c31_firmwaremx-5070nmx-m1056_firmwaremx-c304_firmwarebp-c545wd_firmwaremx-2310umx-m264nv_firmwarebp-50m36_firmwaredx-c401bp-70m90mx-3610nmx-7580nbp-b550wd_firmwaremx-4061dx-c310bp-50m45_firmwarebp-50m55_firmwaremx-6070v_amx-m363umx-b401mx-3140n_abp-30c25t_firmwaremx-2314nr_firmwaremx-2310r_firmwaremx-3560nbp-50m31_firmwaremx-b376wh_firmwarebp-70m45_firmwaremx-m354nmx-6050nmx-6500n_firmwaremx-4050vmx-m2630_a_firmwaremx-3050vmx-m315nv_firmwaremx-m753nbp-90c70_firmwaremx-c311_firmwaremx-5111n_firmwaremx-3571_firmwaremx-m1054_firmwaremx-c310mx-4070vmx-m754n_a_firmwaremx-m356n_firmwaremx-m265u_firmwaremx-m265nemx-m623u_firmwaremx-m2630_ae-studio908mx-2640nbp-30c25zmx-6240nmx-c401mx-m623n_firmwaremx-m3070_a_firmwaremx-m264n_firmwaremx-2010umx-3051_firmwaremx-6051mx-6070n_amx-b380p_firmwaremx-m3051mx-m5071s_firmwaremx-m4050mx-m2630_firmwarebp-b547wd_firmwaremx-m3070_amx-3071mx-m6051mx-m265nbp-50m55mx-m1055_firmwaremx-m354u_firmwarebp-70c65_firmwarebp-60c45mx-m1054mx-c382sc_firmwaremx-4140n_a_firmwaremx-6051_firmwarebp-50c36_firmwaremx-b456w_firmwaremx-5141n_abp-70c45bp-30m28mx-6071smx-4051_firmwaremx-m564n_firmwaremx-m315nemx-4141n_firmwaremx-4070v_a_firmwaremx-3100g_firmwaredx-2500n_firmwaredx-2000umx-b380pbp-50c65bp-50m50_firmwaremx-b356wmx-m503n_firmwaremx-b355wmx-5001n_firmwaremx-m314nvmx-m1204_firmwaremx-2314n_firmwaremx-5050nbp-70m55_firmwaremx-b381_firmwaremx-3550nmx-3070n_a_firmwaremx-3640nmx-2651mx-m2630mx-2010u_firmwarebp-70c45_firmwaremx-6070v_firmwaremx-4070nbp-30m35tmx-c400mx-5112n_firmwaremx-7040n_firmwarebp-60c45_firmwaremx-3550vmx-m3050_amx-5140nmx-b382sc_firmwaremx-c381b_firmwaremx-m6570_firmwaremx-b402p_firmwaremx-m283n_firmwaremx-b356w_firmwarebp-c533wr_firmwaredx-c381_firmwarebp-70m36mx-5141n_a_firmwaremx-5050v_firmwaremx-m564n_a_firmwaremx-6070vmx-m6570mx-c402scmx-3050n_a_firmwaremx-m315n_firmwaremx-m354nr_firmwaremx-3060n_firmwaremx-m5071sbp-50m50mx-m623nmx-m6071smx-6070nmx-m904_firmwarebp-50m36mx-3561smx-m315v_firmwaremx-3116ne-STUDIO 908Sharp Digital Full-color MFPs and Monochrome MFPse-STUDIO 1058e-STUDIO 1208mx-b455wz_firmwaremx-m1206_firmwaremx-m7570_firmwaremx-m6071s_firmwaremx-6071s_firmwaree-studio-1208_firmwaremx-6070v_firmwaremx-c304wh_firmwarebp-c545wd_firmwarebp-30c25_firmwarebp-70c65_firmwaremx-8090n_firmwarebp-70m65_firmwarebp-90c80_firmwaremx-7580n_firmwarebp-b550wd_firmwaree-studio-1058_firmwaremx-m905_firmwarebp-70m90_firmwaree-studio-908_firmwaremx-b476wh_firmwaremx-m6070_firmwaremx-8081_firmwarebp-30m35t_firmware
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-4300
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.06% / 17.80%
||
7 Day CHG~0.00%
Published-04 Jan, 2023 | 21:14
Updated-03 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ghostlander Halcyon Block Verification main.cpp AddToBlockIndex access control

A vulnerability has been found in ghostlander Halcyon and classified as critical. Affected by this vulnerability is the function CBlock::AddToBlockIndex of the file src/main.cpp of the component Block Verification. The manipulation leads to improper access controls. The attack can be launched remotely. Upgrading to version 1.1.1.0-hal is able to address this issue. The identifier of the patch is 0675b25ae9cc10b5fdc8ea3a32c642979762d45e. It is recommended to upgrade the affected component. The identifier VDB-217417 was assigned to this vulnerability.

Action-Not Available
Vendor-halcyon_projectghostlander
Product-halcyonHalcyon
CWE ID-CWE-284
Improper Access Control
CVE-2023-47539
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-9||CRITICAL
EPSS-0.07% / 22.48%
||
7 Day CHG-0.03%
Published-18 Mar, 2025 | 13:56
Updated-19 Mar, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper access control vulnerability in FortiMail version 7.4.0 configured with RADIUS authentication and remote_wildcard enabled may allow a remote unauthenticated attacker to bypass admin login via a crafted HTTP request.

Action-Not Available
Vendor-Fortinet, Inc.
Product-FortiMail
CWE ID-CWE-284
Improper Access Control
CVE-2017-18543
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.59% / 68.25%
||
7 Day CHG~0.00%
Published-16 Aug, 2019 | 20:17
Updated-05 Aug, 2024 | 21:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The invite-anyone plugin before 1.3.16 for WordPress has incorrect access control for email-based invitations.

Action-Not Available
Vendor-invite_anyone_projectn/a
Product-invite_anyonen/a
CWE ID-CWE-284
Improper Access Control
CVE-2021-42783
Matching Score-4
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Matching Score-4
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-9.8||CRITICAL
EPSS-0.66% / 70.28%
||
7 Day CHG~0.00%
Published-23 Nov, 2021 | 21:37
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authentication in debug_post_set.cgi in D-Link DWR-932C E1 Firmware 1.0.0.4

Missing Authentication for Critical Function vulnerability in debug_post_set.cgi of D-Link DWR-932C E1 firmware allows an unauthenticated attacker to execute administrative actions.

Action-Not Available
Vendor-D-Link Corporation
Product-dwr-932c_e1_firmwaredwr-932cDWR-932C E1
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-27060
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.25% / 78.50%
||
7 Day CHG~0.00%
Published-22 Mar, 2023 | 00:00
Updated-26 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LightCMS v1.3.7 was discovered to contain a remote code execution (RCE) vulnerability via the image:make function.

Action-Not Available
Vendor-lightcms_projectn/a
Product-lightcmsn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-4702
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 18.70%
||
7 Day CHG~0.00%
Published-14 Sep, 2023 | 19:01
Updated-25 Jun, 2025 | 13:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass in Digital Yepas

Authentication Bypass Using an Alternate Path or Channel vulnerability in Yepas Digital Yepas allows Authentication Bypass.This issue affects Digital Yepas: before 1.0.1.

Action-Not Available
Vendor-yepasYepas
Product-digital_yepasDigital Yepas
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-45274
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.74% / 71.88%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 10:28
Updated-17 Oct, 2024 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MB connect line/Helmholz: Remote code execution via confnet service

An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.

Action-Not Available
Vendor-mbconnectlinehelmholzHelmholzMB connect linemb_connect_linehelmholz
Product-mbnet.mini_firmwarembnet.minirex_100rex_100_firmwarembNET.miniREX100rex_100_firmwarembnet.mini
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-41266
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-80.00% / 99.07%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 20:20
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass issue in the Operator Console

Minio console is a graphical user interface for the for MinIO operator. Minio itself is a multi-cloud object storage project. Affected versions are subject to an authentication bypass issue in the Operator Console when an external IDP is enabled. All users on release v0.12.2 and before are affected and are advised to update to 0.12.3 or newer. Users unable to upgrade should add automountServiceAccountToken: false to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the CONSOLE_IDP_URL, CONSOLE_IDP_CLIENT_ID, CONSOLE_IDP_SECRET and CONSOLE_IDP_CALLBACK environment variable and instead use the Kubernetes service account token.

Action-Not Available
Vendor-minminio
Product-minio_consoleconsole
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-46851
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 29.21%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 00:00
Updated-01 May, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosemuiHarmonyOSEMUI
CWE ID-CWE-284
Improper Access Control
CVE-2019-5620
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-9.8||CRITICAL
EPSS-77.23% / 98.93%
||
7 Day CHG~0.00%
Published-29 Apr, 2020 | 22:15
Updated-17 Sep, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ABB MicroSCADA Pro SYS600 Missing Authentication for Critical Function

ABB MicroSCADA Pro SYS600 version 9.3 suffers from an instance of CWE-306: Missing Authentication for Critical Function.

Action-Not Available
Vendor-Hitachi Energy Ltd.Microsoft CorporationABB
Product-microscada_pro_sys600windows_7windows_xpMicroSCADA Pro SYS600
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-45208
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-0.59% / 68.28%
||
7 Day CHG+0.03%
Published-18 Jun, 2025 | 23:30
Updated-23 Jun, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Versa Director SD-WAN orchestration platform which makes use of Cisco NCS application service. Active and Standby Directors communicate over TCP ports 4566 and 4570 to exchange High Availability (HA) information using a shared password. Affected versions of Versa Director bound to these ports on all interfaces. An attacker that can access the Versa Director could access the NCS service on port 4566 and exploit it to perform unauthorized administrative actions and perform remote code execution. Customers are recommended to follow the hardening guide. Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.

Action-Not Available
Vendor-Versa Networks, Inc.
Product-Director
CWE ID-CWE-284
Improper Access Control
CVE-2021-46384
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-9.69% / 92.61%
||
7 Day CHG~0.00%
Published-04 Mar, 2022 | 21:42
Updated-04 Aug, 2024 | 05:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

https://gitee.com/mingSoft/MCMS MCMS <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successful attacks of this vulnerability can result in takeover of MCMS.

Action-Not Available
Vendor-mingsoftn/a
Product-mcmsn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-45232
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-94.07% / 99.89%
||
7 Day CHG~0.00%
Published-27 Dec, 2021 | 15:06
Updated-04 Aug, 2024 | 04:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
security vulnerability on unauthorized access.

In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin`, all APIs and authentication middleware are developed based on framework `droplet`, but some API directly use the interface of framework `gin` thus bypassing the authentication.

Action-Not Available
Vendor-The Apache Software Foundation
Product-apisix_dashboardApache APISIX Dashboard
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-4119
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-5.3||MEDIUM
EPSS-1.49% / 80.31%
||
7 Day CHG~0.00%
Published-15 Dec, 2021 | 17:25
Updated-03 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control in bookstackapp/bookstack

bookstack is vulnerable to Improper Access Control

Action-Not Available
Vendor-bookstackappbookstackapp
Product-bookstackbookstackapp/bookstack
CWE ID-CWE-284
Improper Access Control
CVE-2024-45233
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.69% / 70.95%
||
7 Day CHG~0.00%
Published-28 Aug, 2024 | 00:00
Updated-30 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in powermail extension through 12.3.5 for TYPO3. Several actions in the OutputController can directly be called, due to missing or insufficiently implemented access checks, resulting in Broken Access Control. Depending on the configuration of the Powermail Frontend plugins, an unauthenticated attacker can exploit this to edit, update, delete, or export data of persisted forms. This can only be exploited when the Powermail Frontend plugins are used. The fixed versions are 7.5.0, 8.5.0, 10.9.0, and 12.4.0.

Action-Not Available
Vendor-in2coden/aTYPO3 Association
Product-powermailn/atypo3
CWE ID-CWE-284
Improper Access Control
CVE-2022-35733
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.45% / 79.99%
||
7 Day CHG-2.19%
Published-23 Aug, 2022 | 01:35
Updated-03 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing authentication for critical function vulnerability in UNIMO Technology digital video recorders (UDR-JA1004/JA1008/JA1016 firmware versions v1.0.20.13 and earlier, and UDR-JA1016 firmware versions v2.0.20.13 and earlier) allows a remote unauthenticated attacker to execute an arbitrary OS command by sending a specially crafted request to the affected device web interface.

Action-Not Available
Vendor-unimoUNIMO Technology Co., Ltd
Product-udr-ja1016_firmwareudr-ja1016udr-ja1004_firmwareudr-ja1008_firmwareudr-ja1004udr-ja1008UNIMO Technology digital video recorders UDR-JA1004/JA1008/JA1016 and UDR-JA1016
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-41418
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.30% / 52.76%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 19:40
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AriaNg v0.1.0~v1.2.2 is affected by an incorrect access control vulnerability through not authenticating visitors' access rights.

Action-Not Available
Vendor-ariang_projectn/a
Product-ariangn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-41194
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.35% / 56.89%
||
7 Day CHG~0.00%
Published-28 Oct, 2021 | 19:40
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control in jupyterhub-firstuseauthenticator

FirstUseAuthenticator is a JupyterHub authenticator that helps new users set their password on their first login to JupyterHub. When JupyterHub is used with FirstUseAuthenticator, a vulnerability in versions prior to 1.0.0 allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. One may upgrade to version 1.0.0 or apply a patch manually to mitigate the vulnerability. For those who cannot upgrade, there is no complete workaround, but a partial mitigation exists. One can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until a patch or upgrade occurs.

Action-Not Available
Vendor-jupyterhubjupyterhub
Product-first_use_authenticatorfirstuseauthenticator
CWE ID-CWE-284
Improper Access Control
CVE-2020-14245
Matching Score-4
Assigner-HCL Software
ShareView Details
Matching Score-4
Assigner-HCL Software
CVSS Score-9.8||CRITICAL
EPSS-0.39% / 59.38%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 06:38
Updated-04 Aug, 2024 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HCL OneTest UI V9.5, V10.0, and V10.1 does not perform authentication for functionality that either requires a provable user identity or consumes a significant amount of resources.

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-onetest_performanceHCL OneTest UI
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2013-0422
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-9.8||CRITICAL
EPSS-93.68% / 99.84%
||
7 Day CHG~0.00%
Published-10 Jan, 2013 | 21:23
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-06-15||Apply updates per vendor instructions.

Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.

Action-Not Available
Vendor-n/aopenSUSEOracle CorporationCanonical Ltd.
Product-jdkopensusejreubuntu_linuxn/aJava Runtime Environment (JRE)
CWE ID-CWE-284
Improper Access Control
CVE-2024-43488
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-3.35% / 86.80%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 17:36
Updated-08 Jul, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Visual Studio Code extension for Arduino Remote Code Execution Vulnerability

Missing authentication for critical function in Visual Studio Code extension for Arduino allows an unauthenticated attacker to perform remote code execution through network attack vector.

Action-Not Available
Vendor-Microsoft Corporation
Product-visual_studio_codeVisual Studio Code
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-42967
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.26% / 49.23%
||
7 Day CHG~0.00%
Published-15 Aug, 2024 | 00:00
Updated-13 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect access control in TOTOLINK LR350 V9.3.5u.6369_B20220309 allows attackers to obtain the apmib configuration file, which contains the username and the password, via a crafted request to /cgi-bin/ExportSettings.sh.

Action-Not Available
Vendor-n/aTOTOLINK
Product-lr350_firmwarelr350n/alr350_firmware
CWE ID-CWE-284
Improper Access Control
CVE-2020-11673
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.48% / 84.68%
||
7 Day CHG~0.00%
Published-13 Apr, 2020 | 15:01
Updated-04 Aug, 2024 | 11:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Responsive Poll through 1.3.4 for Wordpress. It allows an unauthenticated user to manipulate polls, e.g., delete, clone, or view a hidden poll. This is due to the usage of the callback wp_ajax_nopriv function in Includes/Total-Soft-Poll-Ajax.php for sensitive operations.

Action-Not Available
Vendor-total-softn/a
Product-responsive_polln/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-40112
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-10||CRITICAL
EPSS-2.35% / 84.27%
||
7 Day CHG~0.00%
Published-04 Nov, 2021 | 15:35
Updated-07 Nov, 2024 | 21:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Catalyst PON Series Switches Optical Network Terminal Vulnerabilities

Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-catalyst_pon_switch_cgp-ont-4pv_firmwarecatalyst_pon_switch_cgp-ont-1p_firmwarecatalyst_pon_switch_cgp-ont-4pvcatalyst_pon_switch_cgp-ont-1pcatalyst_pon_switch_cgp-ont-4pvccatalyst_pon_switch_cgp-ont-4pcatalyst_pon_switch_cgp-ont-4pvc_firmwarecatalyst_pon_switch_cgp-ont-4tvcw_firmwarecatalyst_pon_switch_cgp-ont-4tvcwcatalyst_pon_switch_cgp-ont-4p_firmwareCisco Catalyst PON Series
CWE ID-CWE-284
Improper Access Control
CVE-2012-6068
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-4.38% / 88.54%
||
7 Day CHG~0.00%
Published-21 Jan, 2013 | 21:00
Updated-02 Jul, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
3S CoDeSys Improper Access Control

The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service.

Action-Not Available
Vendor-3s-softwareFesto3S-Smart Software Solutions
Product-codesys_runtime_systemCECX-X-M1 Modular Controller with CoDeSys and SoftMotionCODESYS Control Runtime fullCECX-X-C1 Modular Master Controller with CoDeSysCoDeSysCODESYS Control RTECODESYS Control Runtime embedded
CWE ID-CWE-284
Improper Access Control
CVE-2012-4681
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-94.14% / 99.90%
||
7 Day CHG~0.00%
Published-28 Aug, 2012 | 00:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.

Action-Not Available
Vendor-n/aRed Hat, Inc.Oracle Corporation
Product-enterprise_linux_desktopenterprise_linux_eusenterprise_linux_workstationjdkjreenterprise_linux_servern/aJava SE
CWE ID-CWE-284
Improper Access Control
CVE-2021-38412
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.6||CRITICAL
EPSS-0.16% / 37.01%
||
7 Day CHG~0.00%
Published-17 Sep, 2021 | 19:07
Updated-17 Sep, 2024 | 00:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Digi PortServer TS 16 Improper Authentication

Properly formatted POST requests to multiple resources on the HTTP and HTTPS web servers of the Digi PortServer TS 16 Rack device do not require authentication or authentication tokens. This vulnerability could allow an attacker to enable the SNMP service and manipulate the community strings to achieve further control in.

Action-Not Available
Vendor-digiDigi International
Product-portserver_ts_16_firmwareportserver_ts_16PortServer TS 16
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-47297
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 23.19%
||
7 Day CHG~0.00%
Published-23 Jun, 2025 | 00:00
Updated-26 Jun, 2025 | 12:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A settings manipulation vulnerability in NCR Terminal Handler v1.5.1 allows attackers to execute arbitrary commands, including editing system security auditing configurations.

Action-Not Available
Vendor-ncrn/a
Product-terminal_handlern/a
CWE ID-CWE-284
Improper Access Control
CVE-2023-46665
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 2.22%
||
7 Day CHG~0.00%
Published-26 Oct, 2023 | 20:08
Updated-16 Jan, 2025 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control in Sielco PolyEco1000

Sielco PolyEco1000 is vulnerable to an authentication bypass vulnerability due to an attacker modifying passwords in a POST request and gain unauthorized access to the affected device with administrative privileges.

Action-Not Available
Vendor-sielcoSielco
Product-polyeco500polyeco1000polyeco300_firmwarepolyeco300polyeco1000_firmwarepolyeco500_firmwarePolyEco1000
CWE ID-CWE-284
Improper Access Control
CVE-2024-42559
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 42.01%
||
7 Day CHG~0.00%
Published-20 Aug, 2024 | 00:00
Updated-20 Aug, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in the login component (process_login.php) of Hotel Management System commit 79d688 allows attackers to authenticate without providing a valid password.

Action-Not Available
Vendor-n/ahotel_management_system_project
Product-n/ahotel_management_system
CWE ID-CWE-284
Improper Access Control
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 18
  • 19
  • Next
Details not found