Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-3263

Summary
Assigner-trellix
Assigner Org ID-01626437-bf8f-4d1c-912a-893b5eb04808
Published At-14 Aug, 2023 | 04:02
Updated At-09 Oct, 2024 | 14:44
Rejected At-
Credits

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:trellix
Assigner Org ID:01626437-bf8f-4d1c-912a-893b5eb04808
Published At:14 Aug, 2023 | 04:02
Updated At:09 Oct, 2024 | 14:44
Rejected At:
▼CVE Numbering Authority (CNA)

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution.

Affected Products
Vendor
Dataprobe, Inc.Dataprobe
Product
iBoot PDU
Platforms
  • Linux
Default Status
unaffected
Versions
Affected
  • From 1.43.03312023 through <= 1.43.03312023 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-289CWE-289: Authentication Bypass by Alternate Name
Type: CWE
CWE ID: CWE-289
Description: CWE-289: Authentication Bypass by Alternate Name
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-421CAPEC-421 Influence Perception of Authority
CAPEC ID: CAPEC-421
Description: CAPEC-421 Influence Perception of Authority
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Sam Quinn
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
N/A
Hyperlink: https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
x_transferred
Hyperlink: https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
Dataprobe, Inc.dataprobe
Product
iboot_pdu
CPEs
  • cpe:2.3:a:dataprobe:iboot_pdu:*:*:*:*:*:*:*:*
Default Status
unaffected
Versions
Affected
  • From 0 through 1.43.03312023 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:trellixpsirt@trellix.com
Published At:14 Aug, 2023 | 05:15
Updated At:22 Aug, 2023 | 16:24

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-c10_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-c10>>-
cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-c20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-c20>>-
cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-n15>>-
cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-n20>>-
cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4-c20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4-c20>>-
cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4-n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4-n20>>-
cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-c10_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-c10>>-
cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-c20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-c20>>-
cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-n15>>-
cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-n20>>-
cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2c10_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2c10>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2c20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2c20>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2n15>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2n20>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-c10_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-c10>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-c20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-c20>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-n15>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-n20>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-2n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-2n15>>-
cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-c10_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-c10>>-
cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-n15>>-
cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-n20>>-
cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE-289Secondarytrellixpsirt@trellix.com
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-289
Type: Secondary
Source: trellixpsirt@trellix.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.htmltrellixpsirt@trellix.com
Vendor Advisory
Hyperlink: https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
Source: trellixpsirt@trellix.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

172Records found

CVE-2022-3186
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.6||HIGH
EPSS-0.17% / 37.88%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 22:28
Updated-15 Apr, 2025 | 19:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where the affected product allows an attacker to access the device’s main management page from the cloud. This feature enables users to remotely connect devices, however, the current implementation permits users to access other device's information.

Action-Not Available
Vendor-Dataprobe, Inc.
Product-iboot-pdu8sa-2n15_firmwareiboot-pdu4a-n15iboot-pdu4sa-n20iboot-pdu4sa-n15iboot-pdu4a-n20_firmwareiboot-pdu8a-2n15iboot-pdu4-n20iboot-pdu8a-n20iboot-pdu8sa-n20iboot-pdu4a-n20iboot-pdu8a-2n15_firmwareiboot-pdu8sa-n20_firmwareiboot-pdu8a-n20_firmwareiboot-pdu8a-2n20iboot-pdu4a-n15_firmwareiboot-pdu8a-n15_firmwareiboot-pdu4sa-n20_firmwareiboot-pdu8sa-2n15iboot-pdu8sa-n15_firmwareiboot-pdu4sa-n15_firmwareiboot-pdu4-n20_firmwareiboot-pdu8a-2n20_firmwareiboot-pdu8sa-n15iboot-pdu8a-n15iBoot-PDU FW
CWE ID-CWE-284
Improper Access Control
CVE-2007-6759
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.79% / 73.43%
||
7 Day CHG~0.00%
Published-07 Apr, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dataprobe iBootBar (with 2007-09-20 and possibly later released firmware) allows remote attackers to bypass authentication, and conduct power-cycle attacks on connected devices, via a DCRABBIT cookie.

Action-Not Available
Vendor-n/aDataprobe, Inc.
Product-ibootbaribootbar_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-6760
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.79% / 73.43%
||
7 Day CHG~0.00%
Published-07 Apr, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dataprobe iBootBar (with 2007-09-20 and possibly later beta firmware) allows remote attackers to bypass authentication, and conduct power-cycle attacks on connected devices, via a DCCOOKIE cookie.

Action-Not Available
Vendor-n/aDataprobe, Inc.
Product-ibootbaribootbar_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-21235
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.01% / 1.75%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 16:41
Updated-05 Aug, 2024 | 12:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit E-mail advertising system before September 2018. It allows authentication bypass and information disclosure, related to Interspire Email Marketer.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-e-mail_advertising_systemn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-34908
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.2||HIGH
EPSS-0.14% / 33.49%
||
7 Day CHG~0.00%
Published-27 Feb, 2023 | 00:00
Updated-30 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the A4N (Aremis 4 Nomad) application 1.5.0 for Android. It possesses an authentication mechanism; however, some features do not require any token or cookie in a request. Therefore, an attacker may send a simple HTTP request to the right endpoint, and obtain authorization to retrieve application data.

Action-Not Available
Vendor-aremisn/a
Product-aremis_4_nomadsn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-287
Improper Authentication
CVE-2025-8348
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.15% / 35.19%
||
7 Day CHG~0.00%
Published-31 Jul, 2025 | 03:32
Updated-12 Sep, 2025 | 17:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kehua Charging Pile Cloud Platform home improper authentication

A vulnerability has been found in Kehua Charging Pile Cloud Platform 1.0 and classified as critical. This vulnerability affects unknown code of the file /home. The manipulation leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-kehuaKehua
Product-charging_pile_cloud_platformCharging Pile Cloud Platform
CWE ID-CWE-287
Improper Authentication
CVE-2021-31602
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-92.77% / 99.75%
||
7 Day CHG~0.00%
Published-08 Nov, 2021 | 03:30
Updated-03 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.

Action-Not Available
Vendor-n/aHitachi, Ltd.
Product-vantara_pentahovantara_pentaho_business_intelligence_servern/a
CWE ID-CWE-287
Improper Authentication
CVE-2016-0796
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.56% / 67.86%
||
7 Day CHG~0.00%
Published-28 Jul, 2022 | 16:35
Updated-05 Aug, 2024 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WordPress Plugin mb.miniAudioPlayer-an HTML5 audio player for your mp3 files is prone to multiple vulnerabilities, including open proxy and security bypass vulnerabilities because it fails to properly verify user-supplied input. An attacker may leverage these issues to hide attacks directed at a target site from behind vulnerable website or to perform otherwise restricted actions and subsequently download files with the extension mp3, mp4a, wav and ogg from anywhere the web server application has read access to the system. WordPress Plugin mb.miniAudioPlayer-an HTML5 audio player for your mp3 files version 1.7.6 is vulnerable; prior versions may also be affected.

Action-Not Available
Vendor-mb.miniaudioplayer_projectn/a
Product-mb.miniaudioplayerWordPress Plugin mb.miniAudioPlayer-an
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-610
Externally Controlled Reference to a Resource in Another Sphere
CVE-2025-7875
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.11% / 30.02%
||
7 Day CHG~0.00%
Published-20 Jul, 2025 | 07:14
Updated-27 Aug, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Metasoft 美特软件 MetaCRM debug.jsp improper authentication

A vulnerability classified as critical has been found in Metasoft 美特软件 MetaCRM up to 6.4.2. This affects an unknown part of the file /debug.jsp. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-metasoftMetasoft 美特软件
Product-metacrmMetaCRM
CWE ID-CWE-287
Improper Authentication
CVE-2022-35198
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.29% / 52.03%
||
7 Day CHG+0.02%
Published-18 Aug, 2022 | 05:35
Updated-03 Aug, 2024 | 09:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Contract Management System v2.0 contains a weak default password which gives attackers to access database connection information.

Action-Not Available
Vendor-contract_management_system_projectn/a
Product-contract_managment_systemn/a
CWE ID-CWE-287
Improper Authentication
CVE-2025-70841
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||CRITICAL
EPSS-0.07% / 20.30%
||
7 Day CHG+0.03%
Published-03 Feb, 2026 | 00:00
Updated-11 Feb, 2026 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption key (APP_KEY), database credentials, SMTP/SendGrid API credentials, and internal configuration parameters, enabling complete system compromise including authentication bypass via session token forgery, direct database access to all tenant data, and email infrastructure takeover. Due to the multi-tenancy architecture, this vulnerability affects all tenants in the system.

Action-Not Available
Vendor-amcodersn/a
Product-dokansn/a
CWE ID-CWE-287
Improper Authentication
CVE-2025-69273
Matching Score-4
Assigner-CA Technologies - A Broadcom Company
ShareView Details
Matching Score-4
Assigner-CA Technologies - A Broadcom Company
CVSS Score-8.7||HIGH
EPSS-0.05% / 16.64%
||
7 Day CHG+0.01%
Published-12 Jan, 2026 | 04:38
Updated-14 Jan, 2026 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Spectrum broken authentication

Improper Authentication vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Authentication Bypass.This issue affects DX NetOps Spectrum: 24.3.10 and earlier.

Action-Not Available
Vendor-Microsoft CorporationLinux Kernel Organization, IncBroadcom Inc.
Product-linux_kernelwindowsdx_netops_spectrumDX NetOps Spectrum
CWE ID-CWE-287
Improper Authentication
CVE-2024-7870
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.71% / 71.89%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 08:30
Updated-07 Oct, 2024 | 12:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PixelYourSite – Your smart PIXEL (TAG) & API Manager <= 9.7.1 and PixelYourSite PRO <= 10.4.2 - Unauthenticated Information Exposure and Log Deletion

The PixelYourSite – Your smart PIXEL (TAG) & API Manager and the PixelYourSite PRO plugins for WordPress are vulnerable to Sensitive Information Exposure in all versions up to, and including, 9.7.1 and 10.4.2, respectively, through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log files, and to delete log files.

Action-Not Available
Vendor-pixelyoursitepixelyoursitepixelyoursite
Product-pixelyoursitePixelYourSite Pro – Your smart PIXEL (TAG) ManagerPixelYourSite – Your smart PIXEL (TAG) & API Managerpixelyoursite_propixelyoursite
CWE ID-CWE-287
Improper Authentication
CVE-2019-15046
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.98% / 89.44%
||
7 Day CHG~0.00%
Published-14 Aug, 2019 | 14:51
Updated-05 Aug, 2024 | 00:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zoho ManageEngine ServiceDesk Plus 10 before 10509 allows unauthenticated sensitive information leakage during Fail Over Service (FOS) replication, aka SD-79989.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.
Product-manageengine_servicedesk_plusn/a
CWE ID-CWE-287
Improper Authentication
CVE-2025-67158
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.07% / 20.17%
||
7 Day CHG+0.02%
Published-02 Jan, 2026 | 00:00
Updated-30 Jan, 2026 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass in the /cgi-bin/jvsweb.cgi endpoint of Revotech I6032W-FHW v1.0.0014 - 20210517 allows attackers to access sensitive information and escalate privileges via a crafted HTTP request.

Action-Not Available
Vendor-revotechn/a
Product-i6032w-fhw_firmwarei6032w-fhwn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-32276
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-14.19% / 94.21%
||
7 Day CHG~0.00%
Published-17 Jun, 2022 | 11:38
Updated-03 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Grafana 8.4.3 allows unauthenticated access via (for example) a /dashboard/snapshot/*?orgId=0 URI. NOTE: the vendor considers this a UI bug, not a vulnerability

Action-Not Available
Vendor-n/aGrafana Labs
Product-grafanan/a
CWE ID-CWE-287
Improper Authentication
CVE-2025-65127
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 10.88%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 00:00
Updated-12 Feb, 2026 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A lack of session validation in the web API component of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows remote unauthenticated attackers to access administrative information-retrieval functions intended for authenticated users. By invoking "get_*" operations, attackers can obtain device configuration data, including plaintext credentials, without authentication or an existing session.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-34535
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.59% / 68.55%
||
7 Day CHG~0.00%
Published-19 Jul, 2022 | 19:03
Updated-03 Aug, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Digital Watchdog DW MEGApix IP cameras A7.2.2_20211029 allows unauthenticated attackers to view internal paths and scripts via web files.

Action-Not Available
Vendor-dwn/a
Product-megapixmegapix_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-30302
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.30%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 06:31
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication of EAP WAPI EAPOL frames from unauthenticated user can lead to information disclosure in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwareqca2066wsa8830qcn9070ipq4028_firmwareqca1062_firmwareqcn5550qca8337ar9380ipq8173_firmwareqca6431_firmwareqcn5124qca4024_firmwareqcn9072qca9992sc8180x\+sdx55ipq8078aipq5028_firmwareqca6420_firmwareipq8069_firmwareqca6390_firmwareqca2064_firmwareqca2062ipq6000qca6335qcn5064wcd9370ipq8072qcn5152_firmwareqca6426qcn9000_firmwareqca9984_firmwareipq5018wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwareipq8076aqcn6024_firmwareqsm8350_firmwareipq8074aqca2065qcn5124_firmwareqsm8350qca1064qca6428qcn5164_firmwareqcn5122_firmwareipq8071sdx55_firmwarewcd9375_firmwareqca8081_firmwareqcn6023_firmwarewcn3998_firmwareqca6420qca6436_firmwareqca10901_firmwareqca6438_firmwareipq5010sd778gipq8070_firmwareqca6310ipq8078a_firmwareipq8174qca9990qcs6490ipq5028qrb5165_firmwareipq4029_firmwareipq8072_firmwareqcn5052sdxr2_5gipq6010sc8280xp_firmwareqca6430qcn9074qca6421sd778g_firmwarewcd9340wsa8810_firmwareqca6436wcn6851qca8081ipq8071aqcn6023ipq8071a_firmwarewcd9385qca9888_firmwareqcn6122wcd9341qca2066_firmwareqca6431qca2065_firmwareqcs6490_firmwaresd870_firmwareqca1062qcn5154_firmwarear8035csr8811qca6390aqt1000qca9898_firmwaresd_8cxsc8180x\+sdx55_firmwarewcd9375qcn9100_firmwarewsa8830_firmwareqca9992_firmwaresd865_5g_firmwareipq5010_firmwareipq8074a_firmwareqca6438qcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqcn5121qcx315qca9898qcn5022_firmwarewcn6750_firmwareipq4028qca6428_firmwareipq5018_firmwareqca8072ipq4018_firmwareqca8337_firmwarewcd9380_firmwareqcn9000ipq8072aqca9980_firmwaresd780gipq8076a_firmwaresd865_5gar9380_firmwareipq8078sdx55m_firmwareipq8173wcn6856_firmwareqcn9012sd888qcn5164qcn6122_firmwareqcx315_firmwarewsa8835qca10901csr8811_firmwarewcd9380sd888_5gqcn5054_firmwareqcn5154qca8075_firmwareipq4018qcn5024ipq6005_firmwarewcn6855_firmwareqca9889ipq8074qca6310_firmwareqca8072_firmwareqca6430_firmwareqca9888qca9994_firmwareqcn5052_firmwareipq8070a_firmwareqcn9012_firmwaresm7325wcn6750qca6335_firmwareipq6018_firmwareipq8076_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwareipq8076sd_8c_firmwareqca6426_firmwareqca9984ipq6028ipq8064ipq8069pmp8074qcn5021qcn5152qcn9024qcn5550_firmwareqca6391sdx55mipq8064_firmwareqca6421_firmwareipq6005aqt1000_firmwareqca2062_firmwarewcn6740_firmwareqcn9100qcn5064_firmwareqcm6490_firmwareipq8078_firmwareqcn5054qcn9070_firmwareqrb5165wcn6851_firmwareipq8070ipq6028_firmwareipq8072a_firmwareqca9994ipq8074_firmwareqca9889_firmwareqca9980qcn5122qcn9024_firmwareipq8174_firmwarewcd9341_firmwarewsa8810sd870qcn5121_firmwarewcn6855wcn6856sd_8cipq6018qcn5022ipq6010_firmwareqca1064_firmwarewcn6740qca6391_firmwareqca2064qca4024sd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareqca8075qcn5021_firmwareqcn9022_firmwareqcn6024qcn9022sc8280xpqca9990_firmwareipq8070aqcn9072_firmwareipq6000_firmwareipq8071_firmwareqcn9074_firmwareipq4029ar8035_firmwaresm7325_firmwareSnapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-287
Improper Authentication
CVE-2025-61884
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-40.22% / 97.24%
||
7 Day CHG-1.56%
Published-12 Oct, 2025 | 02:34
Updated-27 Oct, 2025 | 17:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-11-10||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-configuratorOracle ConfiguratorE-Business Suite
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE ID-CWE-501
Trust Boundary Violation
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CWE ID-CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
CVE-2016-2032
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.90% / 75.29%
||
7 Day CHG~0.00%
Published-31 Jan, 2020 | 19:53
Updated-05 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in the Aruba AirWave Management Platform 8.x prior to 8.2 in the management interface of an underlying system component called RabbitMQ, which could let a malicious user obtain sensitive information. This interface listens on TCP port 15672 and 55672

Action-Not Available
Vendor-n/aAruba Networks
Product-arubaosaruba_instantairwaven/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-27990
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.56% / 67.86%
||
7 Day CHG~0.00%
Published-14 Apr, 2021 | 13:56
Updated-03 Aug, 2024 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Appspace 6.2.4 is vulnerable to a broken authentication mechanism where pages such as /medianet/mail.aspx can be called directly and the framework is exposed with layouts, menus and functionalities.

Action-Not Available
Vendor-appspacen/a
Product-appspacen/a
CWE ID-CWE-287
Improper Authentication
CVE-2024-10173
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.10% / 28.40%
||
7 Day CHG~0.00%
Published-20 Oct, 2024 | 05:00
Updated-22 Oct, 2024 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
didi DDMQ Console Module improper authentication

A vulnerability has been found in didi DDMQ 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Console Module. The manipulation with the input /;login leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-didiglobaldidididi
Product-ddmqDDMQddmq
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-30995
Matching Score-4
Assigner-Acronis International GmbH
ShareView Details
Matching Score-4
Assigner-Acronis International GmbH
CVSS Score-9.3||CRITICAL
EPSS-56.47% / 98.05%
||
7 Day CHG~0.00%
Published-03 May, 2023 | 10:50
Updated-30 Jan, 2025 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.

Action-Not Available
Vendor-Acronis (Acronis International GmbH)Linux Kernel Organization, IncMicrosoft Corporation
Product-cyber_protectwindowscyber_backuplinux_kernelAcronis Cyber Backup 12.5Acronis Cyber Protect 15
CWE ID-CWE-287
Improper Authentication
CVE-2025-61665
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.7||HIGH
EPSS-0.23% / 45.76%
||
7 Day CHG~0.00%
Published-02 Oct, 2025 | 20:39
Updated-07 Oct, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WeGIA: Broken Access Control in `get_relatorios_socios.php` Endpoint

WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Broken Access Control vulnerability, identified in the get_relatorios_socios.php endpoint. This vulnerability allows unauthenticated attackers to directly access sensitive personal and financial information of members without requiring authentication or authorization. This issue is fixed in version 3.5.0.

Action-Not Available
Vendor-wegiaLabRedesCefetRJ
Product-wegiaWeGIA
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-287
Improper Authentication
CVE-2016-11042
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.11% / 30.28%
||
7 Day CHG~0.00%
Published-07 Apr, 2020 | 12:54
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) software. There is a SIM Lock bypass. The Samsung ID is SVE-2016-5381 (June 2016).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-6847
Matching Score-4
Assigner-GitHub, Inc. (Products Only)
ShareView Details
Matching Score-4
Assigner-GitHub, Inc. (Products Only)
CVSS Score-7.5||HIGH
EPSS-0.16% / 36.46%
||
7 Day CHG~0.00%
Published-21 Dec, 2023 | 20:46
Updated-02 Aug, 2024 | 08:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Authentication in GitHub Enterprise Server leading to Authentication Bypass for Public Repository Data

An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed a bypass of Private Mode by using a specially crafted API request. To exploit this vulnerability, an attacker would need network access to the Enterprise Server appliance configured in Private Mode. This vulnerability affected all versions of GitHub Enterprise Server since 3.9 and was fixed in version 3.9.7, 3.10.4, and 3.11.1. This vulnerability was reported via the GitHub Bug Bounty program.

Action-Not Available
Vendor-GitHub, Inc.
Product-enterprise_serverEnterprise Server
CWE ID-CWE-287
Improper Authentication
CVE-2022-28955
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-92.71% / 99.75%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 11:50
Updated-03 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An access control issue in D-Link DIR816L_FW206b01 allows unauthenticated attackers to access folders folder_view.php and category_view.php.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-816l_firmwaredir-816ln/a
CWE ID-CWE-287
Improper Authentication
CVE-2016-11057
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.28% / 50.62%
||
7 Day CHG~0.00%
Published-28 Apr, 2020 | 16:11
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by mishandling of repeated URL calls. This affects JNR1010v2 before 2017-01-06, WNR614 before 2017-01-06, WNR618 before 2017-01-06, JWNR2000v5 before 2017-01-06, WNR2020 before 2017-01-06, JWNR2010v5 before 2017-01-06, WNR1000v4 before 2017-01-06, WNR2020v2 before 2017-01-06, R6220 before 2017-01-06, and WNDR3700v5 before 2017-01-06.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-jnr1010_firmwarewnr618wnr2020_firmwarewnr614wnr614_firmwarewndr3700jwnr2000_firmwarewnr2020r6220_firmwarewndr3700_firmwarewnr1000jwnr2010jwnr2000wnr1000_firmwarer6220jnr1010wnr618_firmwarejwnr2010_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2024-5957
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-6.3||MEDIUM
EPSS-0.08% / 23.45%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 10:49
Updated-06 Sep, 2024 | 16:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows unauthenticated remote attackers to bypass authentication and gain APIs access of the Manager.

Action-Not Available
Vendor-Musarubra US LLC (Trellix)
Product-intrusion_prevention_system_managerIntrusion Prevention System (IPS) Manager
CWE ID-CWE-305
Authentication Bypass by Primary Weakness
CWE ID-CWE-287
Improper Authentication
CVE-2023-5627
Matching Score-4
Assigner-Moxa Inc.
ShareView Details
Matching Score-4
Assigner-Moxa Inc.
CVSS Score-7.5||HIGH
EPSS-0.08% / 22.86%
||
7 Day CHG~0.00%
Published-01 Nov, 2023 | 15:04
Updated-05 Sep, 2024 | 15:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Implementation of Authentication Algorithm Vulnerability

A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service.

Action-Not Available
Vendor-Moxa Inc.
Product-nport_6610-32_firmwarenport_6650-32-hv-t_firmwarenport_6450_firmwarenport_6650-8_firmwarenport_6650-16-t_firmwarenport_6250-s-sc_firmwarenport_6150nport_6610-8-48vnport_6650-16-hv-tnport_6650-32-hv-tnport_6650-8-tnport_6250nport_6610-16_firmwarenport_6450-t_firmwarenport_6250_firmwarenport_6610-16-48vnport_6150_firmwarenport_6250-s-sc-tnport_6650-8-hv-tnport_6250-m-sc-t_firmwarenport_6650-16-tnport_6650-32-48v_firmwarenport_6650-32-48vnport_6450nport_6610-8_firmwarenport_6610-32-48v_firmwarenport_6650-16-hv-t_firmwarenport_6450-tnport_6150-t_firmwarenport_6250-tnport_6250-s-sc-t_firmwarenport_6250-s-scnport_6610-32-48vnport_6610-32nport_6250-t_firmwarenport_6650-8-48vnport_6650-8-hv-t_firmwarenport_6610-16-48v_firmwarenport_6650-16-48v_firmwarenport_6250-m-sc_firmwarenport_6610-8nport_6150-tnport_6650-16nport_6650-8nport_6650-16_firmwarenport_6610-16nport_6650-32_firmwarenport_6650-8-48v_firmwarenport_6650-8-t_firmwarenport_6650-16-48vnport_6650-32nport_6250-m-sc-tnport_6610-8-48v_firmwarenport_6250-m-scNPort 6000 Seriesnport_6000
CWE ID-CWE-303
Incorrect Implementation of Authentication Algorithm
CWE ID-CWE-257
Storing Passwords in a Recoverable Format
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-287
Improper Authentication
CVE-2023-6203
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-0.58% / 68.31%
||
7 Day CHG~0.00%
Published-18 Dec, 2023 | 20:07
Updated-07 Oct, 2024 | 12:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The Events Calendar < 6.2.8.1 - Unauthenticated Arbitrary Password Protected Post Read

The Events Calendar WordPress plugin before 6.2.8.1 discloses the content of password protected posts to unauthenticated users via a crafted request

Action-Not Available
Vendor-UnknownThe Events Calendar (StellarWP)
Product-the_events_calendarThe Events Calendar
CWE ID-CWE-287
Improper Authentication
CVE-2023-6250
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-0.18% / 39.45%
||
7 Day CHG~0.00%
Published-26 Dec, 2023 | 18:33
Updated-02 Aug, 2024 | 08:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BestWebSoft's Like & Share < 2.74 - Unauthenticated Password Protected Post Read

The BestWebSoft's Like & Share WordPress plugin before 2.74 discloses the content of password protected posts to unauthenticated users via a meta tag

Action-Not Available
Vendor-UnknownBestWebSoft
Product-like_\&_shareBestWebSoft's Like & Share
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2023-6451
Matching Score-4
Assigner-The Missing Link Australia (TML)
ShareView Details
Matching Score-4
Assigner-The Missing Link Australia (TML)
CVSS Score-8.6||HIGH
EPSS-0.04% / 11.31%
||
7 Day CHG~0.00%
Published-16 Feb, 2024 | 04:06
Updated-09 Jan, 2025 | 14:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Publicly Known Cryptographic Machine Key In Procura Portal Application

Publicly known cryptographic machine key in AlayaCare's Procura Portal before 9.0.1.2 allows attackers to forge their own authentication cookies and bypass the application's authentication mechanisms.

Action-Not Available
Vendor-alayacareAlayaCare
Product-procuraProcura Portalprocura_portal
CWE ID-CWE-1394
Use of Default Cryptographic Key
CWE ID-CWE-287
Improper Authentication
CVE-2021-26627
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.38% / 59.02%
||
7 Day CHG~0.00%
Published-19 Apr, 2022 | 20:26
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EDrhyme QCP 200W Information Exposure Vulnerability

Real-time image information exposure is caused by insufficient authentication for activated RTSP port. This vulnerability could allow to remote attackers to send the RTSP requests using ffplay command and lead to leakage a live image.

Action-Not Available
Vendor-qcpEDrhyme Co.,Ltd
Product-qcp200w_firmwareqcp200wQCP 200W
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2022-26975
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.53%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 11:34
Updated-03 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Barco Control Room Management Suite web application, which is part of TransForm N before 3.14, is exposing log files without authentication.

Action-Not Available
Vendor-barcon/a
Product-control_room_management_suiten/a
CWE ID-CWE-287
Improper Authentication
CVE-2013-2569
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-68.04% / 98.55%
||
7 Day CHG~0.00%
Published-29 Jan, 2020 | 17:20
Updated-06 Aug, 2024 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Security Bypass vulnerability exists in Zavio IP Cameras through 1.6.3 because the RTSP protocol authentication is disabled by default, which could let a malicious user obtain unauthorized access to the live video stream.

Action-Not Available
Vendor-zavion/a
Product-f312a_firmwaref3105f312af3105_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-5329
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.3||MEDIUM
EPSS-0.17% / 37.73%
||
7 Day CHG~0.00%
Published-02 Oct, 2023 | 00:00
Updated-20 Sep, 2024 | 16:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Field Logic DataCube4 Web API improper authentication

A vulnerability classified as problematic was found in Field Logic DataCube4 up to 20231001. This vulnerability affects unknown code of the file /api/ of the component Web API. The manipulation leads to improper authentication. The exploit has been disclosed to the public and may be used. VDB-241030 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-f-logicField Logic
Product-datacube4_firmwaredatacube4DataCube4
CWE ID-CWE-287
Improper Authentication
CVE-2022-26508
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.29% / 51.61%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in the Intel(R) SDP Tool before version 3.0.0 may allow an unauthenticated user to potentially enable information disclosure via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_debug_and_provisioning_toolIntel(R) SDP Tool
CWE ID-CWE-287
Improper Authentication
CVE-2022-24882
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-1.11% / 77.81%
||
7 Day CHG~0.00%
Published-26 Apr, 2022 | 00:00
Updated-03 Nov, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server side NTLM does not properly check parameters in FreeRDP

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds.

Action-Not Available
Vendor-FreeRDPFedora Project
Product-fedorafreerdpextra_packages_for_enterprise_linuxFreeRDP
CWE ID-CWE-287
Improper Authentication
CVE-2022-25027
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.30% / 79.42%
||
7 Day CHG~0.00%
Published-12 Jan, 2023 | 00:00
Updated-08 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Forgotten Password functionality of Rocket TRUfusion Portal v7.9.2.1 allows remote attackers to bypass authentication and access restricted pages by validating the user's session token when the "Password forgotten?" button is clicked.

Action-Not Available
Vendor-rocketsoftwaren/a
Product-trufusion_enterprisen/a
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2022-25667
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 40.28%
||
7 Day CHG~0.00%
Published-15 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information disclosure in kernel due to improper handling of ICMP requests in Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn9072_firmwareqcn9000qcn5054_firmwareqca9889qcn6024_firmwareipq5018ipq6028qcn9070qcn5122qca9990ipq8078aqca7500qca9889_firmwareipq5028_firmwareqcn5124qcn9003ipq9008ipq5010_firmwareipq9008_firmwareqca4024_firmwarecsr8811ipq6018_firmwareqcn9100_firmwareqcn5122_firmwareqcn5022_firmwareqcn6024ipq8078a_firmwareqca8072ipq6010ipq4029_firmwareqcn5024qcn9074ipq4019_firmwareqcn5054qca9994qcn6102_firmwareqcn5024_firmwareqcn5052ipq8064qca8081qca9880qcn6132_firmwareipq6018qcn5152_firmwareipq5018_firmwareqcn6100_firmwareqca9985qcn6112qcn9024_firmwareqca8072_firmwareipq4028_firmwareipq8072aipq8070aqca9898_firmwareipq8070a_firmwareqca9880_firmwareqcn5124_firmwareipq8078_firmwareipq4019qcn5164_firmwareqca9994_firmwareqcn5152ipq6028_firmwareqca9992qcn6023qcn6102qca8081_firmwareqca9984ipq8068qcn9022ipq8065_firmwareqca9985_firmwareqca9888_firmwarecsr8811_firmwareqcn9002_firmwareqca9898qca8075_firmwareqcn5164qcn6122_firmwareqca9990_firmwareipq8068_firmwareipq8072a_firmwareipq8078ipq8076aqcn6112_firmwareipq4029ipq8071aqca4024qcn9000_firmwareipq8173_firmwareipq8065qcn9001_firmwareqcn9070_firmwareqca8075ipq8076qcn5154_firmwareipq6010_firmwarear9380_firmwareqca9984_firmwareqcn5052_firmwareqcn9024ipq8076a_firmwarear9380qca9888ipq8074aqcn6023_firmwareipq8174_firmwareipq4028qca9886_firmwareqcn6100qca7500_firmwareipq8174ipq8064_firmwareqcn6122qcn6132ipq4018_firmwareqcn9074_firmwareqca9992_firmwareqcn5154ipq8173qcn9001qcn9072ipq8076_firmwareqca9980_firmwareqcn9003_firmwareqcn9100qcn5022ipq8071a_firmwareipq6000qca9980ipq5010qcn9002qcn9022_firmwareipq5028ipq8074a_firmwareqca9886ipq6000_firmwareipq4018Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-287
Improper Authentication
CVE-2013-1391
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-87.15% / 99.43%
||
7 Day CHG~0.00%
Published-30 Oct, 2019 | 20:36
Updated-06 Aug, 2024 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication bypass vulnerability in the the web interface in Hunt CCTV, Capture CCTV, Hachi CCTV, NoVus CCTV, and Well-Vision Inc DVR systems allows a remote attacker to retrieve the device configuration.

Action-Not Available
Vendor-novuscctvhachicapturecctvvsphuntcctvn/a
Product-hdr-04kd_firmwaretw-dvr604_firmwarecdr_0820vde_firmwaredvr-04ch_firmwarenv-dvr1216dvr-08ch_firmwarehv-08rd_pro_firmwaredvr-16chhv-08rd_procdr_0410ve_firmwaredvr-04ncdr6-7316a4hlnv-dvr1204hdr-04kdtw-dvr616dr6-7316a4h_firmwaredr6-7316a4hl_firmwarehv-04rd_procdr_0410venv-dvr1208_firmwaredr6-704a4h_firmwaredvr-08chtw-dvr616_firmwaredvr-08ncnv-dvr1208nv-dvr1216_firmwaredr6-704a4hdvr-04chdvr-04nc_firmwarehdr-08kddvr-16ch_firmwarenv-dvr1204_firmwaredr6-708a4hcdr_0820vdedr6-7316a4hhdr-08kd_firmwaretw-dvr604dr6-708a4h_firmwarehv-04rd_pro_firmwaredvr-08nc_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-52161
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.61% / 69.23%
||
7 Day CHG~0.00%
Published-22 Feb, 2024 | 00:00
Updated-04 Nov, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

Action-Not Available
Vendor-n/aIntel Corporation
Product-inet_wireless_daemonn/ainet_wireless_daemon
CWE ID-CWE-287
Improper Authentication
CVE-2021-26620
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.61% / 69.23%
||
7 Day CHG~0.00%
Published-25 Mar, 2022 | 18:02
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IPTIME NAS2dual improper authentication vulnerability

An improper authentication vulnerability leading to information leakage was discovered in iptime NAS2dual. Remote attackers are able to steal important information in the server by exploiting vulnerabilities such as insufficient authentication when accessing the shared folder and changing user’s passwords.

Action-Not Available
Vendor-iptimeEFM Networks Co., Ltd
Product-nas1dualnas3nas101nas4dualnas4_firmwarenas1dual_firmwarenas2dual_firmwarenas101_firmwarenas3_firmwarenas-iienas2dualnas-ii_firmwarenas-i_firmwarenas-inas4dual_firmwarenas-iinas-iie_firmwarenas4ipTIME NAS product (NAS1, 2, 3, 4, 1dual, 2dual 4dual)
CWE ID-CWE-287
Improper Authentication
CVE-2021-25368
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-3.3||LOW
EPSS-0.14% / 33.66%
||
7 Day CHG~0.00%
Published-25 Mar, 2021 | 16:15
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hijacking vulnerability in Samsung Cloud prior to version 4.7.0.3 allows attackers to intercept when the provider is executed.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-cloudSamsung Cloud
CWE ID-CWE-287
Improper Authentication
CVE-2021-24881
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-1.10% / 77.69%
||
7 Day CHG~0.00%
Published-23 Jan, 2023 | 14:31
Updated-02 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Passster < 3.5.5.9 - Protection Bypass & Arbitrary Post Access

The Passster WordPress plugin before 3.5.5.9 does not properly check for password, as well as that the post to be viewed is public, allowing unauthenticated users to bypass the protection offered by the plugin, and access arbitrary posts (such as private) content, by sending a specifically crafted request.

Action-Not Available
Vendor-passster_projectUnknown
Product-passterPassster
CWE ID-CWE-287
Improper Authentication
CVE-2024-37367
Matching Score-4
Assigner-Rockwell Automation
ShareView Details
Matching Score-4
Assigner-Rockwell Automation
CVSS Score-8.2||HIGH
EPSS-0.09% / 25.01%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 14:17
Updated-16 Aug, 2024 | 19:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FactoryTalk® View SE v12 Information Leakage Vulnerability via Authentication Restriction

A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE v12. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. This action is allowed without proper authentication verification.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-factorytalk_viewFactoryTalk® View SE
CWE ID-CWE-287
Improper Authentication
CVE-2023-45801
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.10% / 27.11%
||
7 Day CHG~0.00%
Published-13 Dec, 2023 | 02:05
Updated-02 Aug, 2024 | 20:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Authentication vulnerability in Nadatel DVR allows Information Elicitation.This issue affects DVR: from 3.0.0 before 9.9.0.

Action-Not Available
Vendor-nadatelNadatel
Product-at-0402rat-0815rat-0823s_firmwareat-0402eat-0413sat-1623m_firmwareat-0413m_firmwareat-1643m_firmwareat-1623mat-0815l_firmwareat-1623r_firmwareat-0823m_firmwareat-1623e_firmwareat-0402m_firmwareat-1623eat-1643s_firmwareat-1623l_firmwareat-0402lat-1623rat-1643mat-0815eat-1623lat-0823mat-0815e_firmwareat-0815r_firmwareat-0402mat-0402l_firmwareat-0815mat-0402e_firmwareat-0402r_firmwareat-0413s_firmwareat-0815lat-1643sat-0823sat-0413mat-0815m_firmwareDVR
CWE ID-CWE-287
Improper Authentication
CVE-2023-44096
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.07% / 21.27%
||
7 Day CHG~0.00%
Published-11 Oct, 2023 | 10:37
Updated-18 Sep, 2024 | 15:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosemuiHarmonyOSEMUI
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found