Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-47406

Summary
Assigner-jpcert
Assigner Org ID-ede6fdc4-6654-4307-a26d-3331c018e2ce
Published At-25 Oct, 2024 | 06:18
Updated At-25 Oct, 2024 | 18:38
Rejected At-
Credits

Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:jpcert
Assigner Org ID:ede6fdc4-6654-4307-a26d-3331c018e2ce
Published At:25 Oct, 2024 | 06:18
Updated At:25 Oct, 2024 | 18:38
Rejected At:
▼CVE Numbering Authority (CNA)

Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.

Affected Products
Vendor
Sharp Corporation
Product
Sharp Digital Full-color MFPs and Monochrome MFPs
Versions
Affected
  • see the information provided by Sharp Corporation
Vendor
Toshiba Tec Corporation
Product
e-STUDIO 908
Versions
Affected
  • T2.12.h3.00 and earlier versions
Vendor
Toshiba Tec Corporation
Product
e-STUDIO 1058
Versions
Affected
  • T1.01.h4.00 and earlier versions
Vendor
Toshiba Tec Corporation
Product
e-STUDIO 1208
Versions
Affected
  • T1.01.h4.00 and earlier versions
Problem Types
TypeCWE IDDescription
CWECWE-288Authentication Bypass Using an Alternate Path or Channel
Type: CWE
CWE ID: CWE-288
Description: Authentication Bypass Using an Alternate Path or Channel
Metrics
VersionBase scoreBase severityVector
3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://jvn.jp/en/vu/JVNVU95063136/
N/A
https://global.sharp/products/copier/info/info_security_2024-10.html
N/A
https://www.toshibatec.com/information/20241025_01.html
N/A
Hyperlink: https://jvn.jp/en/vu/JVNVU95063136/
Resource: N/A
Hyperlink: https://global.sharp/products/copier/info/info_security_2024-10.html
Resource: N/A
Hyperlink: https://www.toshibatec.com/information/20241025_01.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
sharp
Product
bp-90c80_firmware
CPEs
  • cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 210 (custom)
Vendor
sharp
Product
bp-70c65_firmware
CPEs
  • cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 320 (custom)
Vendor
sharp
Product
mx-8081_firmware
CPEs
  • cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 160 (custom)
Vendor
sharp
Product
mx-b476wh_firmware
CPEs
  • cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 413 (custom)
Vendor
sharp
Product
mx-m905_firmware
CPEs
  • cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 612 (custom)
Vendor
sharp
Product
mx-6071s_firmware
CPEs
  • cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 613 (custom)
Vendor
sharp
Product
bp-30c25_firmware
CPEs
  • cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 130 (custom)
Vendor
sharp
Product
mx-7580n_firmware
CPEs
  • cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 503 (custom)
Vendor
sharp
Product
mx-8090n_firmware
CPEs
  • cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 405 (custom)
Vendor
sharp
Product
mx-6070v_firmware
CPEs
  • cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 802 (custom)
Vendor
sharp
Product
bp-c545wd_firmware
CPEs
  • cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 262 (custom)
Vendor
sharp
Product
mx-c304wh_firmware
CPEs
  • cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 520 (custom)
Vendor
sharp
Product
bp-70m90_firmware
CPEs
  • cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 310 (custom)
Vendor
sharp
Product
bp-70m65_firmware
CPEs
  • cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 320 (custom)
Vendor
sharp
Product
mx-m1206_firmware
CPEs
  • cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 200 (custom)
Vendor
sharp
Product
mx-m7570_firmware
CPEs
  • cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 456 (custom)
Vendor
sharp
Product
mx-m6071s_firmware
CPEs
  • cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 413 (custom)
Vendor
sharp
Product
bp-30m35t_firmware
CPEs
  • cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 220 (custom)
Vendor
sharp
Product
mx-m6070_firmware
CPEs
  • cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 503 (custom)
Vendor
sharp
Product
bp-b550wd_firmware
CPEs
  • cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 260 (custom)
Vendor
sharp
Product
mx-b455wz_firmware
CPEs
  • cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 404 (custom)
Vendor
toshibatec
Product
e-studio-908_firmware
CPEs
  • cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through t2.12.h3.00 (custom)
Vendor
toshibatec
Product
e-studio-1058_firmware
CPEs
  • cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through t1.01.h4.00 (custom)
Vendor
toshibatec
Product
e-studio-1208_firmware
CPEs
  • cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through t1.01.h4.00 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:vultures@jpcert.or.jp
Published At:25 Oct, 2024 | 07:15
Updated At:05 Nov, 2024 | 19:36

Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CPE Matches

toshibatec
toshibatec
>>e-studio1058_firmware>>Versions up to t1.01.h4.00(inclusive)
cpe:2.3:o:toshibatec:e-studio1058_firmware:*:*:*:*:*:*:*:*
toshibatec
toshibatec
>>e-studio1058>>-
cpe:2.3:h:toshibatec:e-studio1058:-:*:*:*:*:*:*:*
toshibatec
toshibatec
>>e-studio1208_firmware>>Versions up to t1.01.h4.00(inclusive)
cpe:2.3:o:toshibatec:e-studio1208_firmware:*:*:*:*:*:*:*:*
toshibatec
toshibatec
>>e-studio1208>>-
cpe:2.3:h:toshibatec:e-studio1208:-:*:*:*:*:*:*:*
toshibatec
toshibatec
>>e-studio908_firmware>>Versions up to t2.12.h3.00(inclusive)
cpe:2.3:o:toshibatec:e-studio908_firmware:*:*:*:*:*:*:*:*
toshibatec
toshibatec
>>e-studio908>>-
cpe:2.3:h:toshibatec:e-studio908:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-90c70_firmware>>-
cpe:2.3:o:sharp:bp-90c70_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-90c70>>-
cpe:2.3:h:sharp:bp-90c70:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-90c80_firmware>>-
cpe:2.3:o:sharp:bp-90c80_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-90c80>>-
cpe:2.3:h:sharp:bp-90c80:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-70c65_firmware>>-
cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-70c65>>-
cpe:2.3:h:sharp:bp-70c65:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-70c55_firmware>>-
cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-70c55>>-
cpe:2.3:h:sharp:bp-70c55:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-70c45_firmware>>-
cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-70c45>>-
cpe:2.3:h:sharp:bp-70c45:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-70c36_firmware>>-
cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-70c36>>-
cpe:2.3:h:sharp:bp-70c36:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-70c31_firmware>>-
cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-70c31>>-
cpe:2.3:h:sharp:bp-70c31:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-60c45_firmware>>-
cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-60c45>>-
cpe:2.3:h:sharp:bp-60c45:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-60c36_firmware>>-
cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-60c36>>-
cpe:2.3:h:sharp:bp-60c36:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-60c31_firmware>>-
cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-60c31>>-
cpe:2.3:h:sharp:bp-60c31:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c65_firmware>>-
cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c65>>-
cpe:2.3:h:sharp:bp-50c65:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c55_firmware>>-
cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c55>>-
cpe:2.3:h:sharp:bp-50c55:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c45_firmware>>-
cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c45>>-
cpe:2.3:h:sharp:bp-50c45:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c36_firmware>>-
cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c36>>-
cpe:2.3:h:sharp:bp-50c36:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c31_firmware>>-
cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c31>>-
cpe:2.3:h:sharp:bp-50c31:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c26_firmware>>-
cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-50c26>>-
cpe:2.3:h:sharp:bp-50c26:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-55c26_firmware>>-
cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>bp-55c26>>-
cpe:2.3:h:sharp:bp-55c26:-:*:*:*:*:*:*:*
sharp
sharp
>>mx-8081_firmware>>-
cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>mx-8081>>-
cpe:2.3:h:sharp:mx-8081:-:*:*:*:*:*:*:*
sharp
sharp
>>mx-7081_firmware>>-
cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>mx-7081>>-
cpe:2.3:h:sharp:mx-7081:-:*:*:*:*:*:*:*
sharp
sharp
>>mx-6071_firmware>>-
cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>mx-6071>>-
cpe:2.3:h:sharp:mx-6071:-:*:*:*:*:*:*:*
sharp
sharp
>>mx-5071_firmware>>-
cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>mx-5071>>-
cpe:2.3:h:sharp:mx-5071:-:*:*:*:*:*:*:*
sharp
sharp
>>mx-4071_firmware>>-
cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*
sharp
sharp
>>mx-4071>>-
cpe:2.3:h:sharp:mx-4071:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-306Primarynvd@nist.gov
CWE-288Secondaryvultures@jpcert.or.jp
CWE ID: CWE-306
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-288
Type: Secondary
Source: vultures@jpcert.or.jp
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://global.sharp/products/copier/info/info_security_2024-10.htmlvultures@jpcert.or.jp
Vendor Advisory
https://jvn.jp/en/vu/JVNVU95063136/vultures@jpcert.or.jp
Third Party Advisory
https://www.toshibatec.com/information/20241025_01.htmlvultures@jpcert.or.jp
Vendor Advisory
Hyperlink: https://global.sharp/products/copier/info/info_security_2024-10.html
Source: vultures@jpcert.or.jp
Resource:
Vendor Advisory
Hyperlink: https://jvn.jp/en/vu/JVNVU95063136/
Source: vultures@jpcert.or.jp
Resource:
Third Party Advisory
Hyperlink: https://www.toshibatec.com/information/20241025_01.html
Source: vultures@jpcert.or.jp
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

CVE-2024-27144
Matching Score-8
Assigner-Toshiba Corporation
ShareView Details
Matching Score-8
Assigner-Toshiba Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.19% / 77.92%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 02:31
Updated-13 Feb, 2025 | 17:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pre-authenticated Remote Code Execution

The Toshiba printers provide several ways to upload files using the web interface without authentication. An attacker can overwrite any insecure files. And the Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. The programs can be replaced by malicious programs by any local or remote attacker. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL.

Action-Not Available
Vendor-Toshiba Tec Corporationtoshibatec
Product-Toshiba Tec e-Studio multi-function peripheral (MFP)e-studio-4528-age-studio-2020_ace-studio-3115-nce-studio-2110-ace-studio-2015-nce-studio-3015-nce-studio-2510-ace-studio-3028-ae-studio-5525_ace-studio-5528-ae-studio-2515-nce-studio-4515_ace-studio-2518_ae-studio-400-ace-studio-3118_ae-studio-3525_ace-studio-3118_age-studio-2528-ae-studio-4615_ace-studio-2520_nce-studio-2618_ae-studio-9029-ae-studio-3018_ae-studio-7527-ace-studio-4525_ace-studio-2018_ae-studio-2021_ace-studio-2521_ace-studio-3025_ace-studio-6525_ace-studio-3528-age-studio-6527-ace-studio-2610-ace-studio-5015_ace-studio-6529-ae-studio-3515-nce-studio-6528-ae-studio-3528-ae-studio-3615-nce-studio-7529-ae-studio-2010-ace-studio-4528-ae-studio-2615-nce-studio-6526-ace-studio-5525_acge-studio-330-ace-studio-5115_ace-studio-2525_ace-studio-6525_acge-studio-3525_acg
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-27174
Matching Score-8
Assigner-Toshiba Corporation
ShareView Details
Matching Score-8
Assigner-Toshiba Corporation
CVSS Score-9.8||CRITICAL
EPSS-4.70% / 88.93%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 04:03
Updated-13 Feb, 2025 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
insecure upload

Remote Command program allows an attacker to get Remote Code Execution. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL.

Action-Not Available
Vendor-Toshiba Tec Corporationtoshibatec
Product-Toshiba Tec e-Studio multi-function peripheral (MFP)e-studio-4528-age-studio-2020_ace-studio-3115-nce-studio-2110-ace-studio-2015-nce-studio-3015-nce-studio-2510-ace-studio-3028-ae-studio-5525_ace-studio-5528-ae-studio-2515-nce-studio-4515_ace-studio-2518_ae-studio-400-ace-studio-3118_ae-studio-3525_ace-studio-3118_age-studio-2528-ae-studio-4615_ace-studio-2520_nce-studio-2618_ae-studio-9029-ae-studio-3018_ae-studio-7527-ace-studio-4525_ace-studio-2018_ae-studio-2021_ace-studio-2521_ace-studio-3025_ace-studio-6525_ace-studio-3528-age-studio-6527-ace-studio-2610-ace-studio-5015_ace-studio-6529-ae-studio-3515-nce-studio-6528-ae-studio-3528-ae-studio-3615-nce-studio-7529-ae-studio-2010-ace-studio-4528-ae-studio-2615-nce-studio-6526-ace-studio-5525_acge-studio-330-ace-studio-5115_ace-studio-2525_ace-studio-6525_acge-studio-3525_acg
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-27145
Matching Score-8
Assigner-Toshiba Corporation
ShareView Details
Matching Score-8
Assigner-Toshiba Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.26% / 48.62%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 02:33
Updated-13 Feb, 2025 | 17:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Post-authenticated Remote Code Execution

The Toshiba printers provide several ways to upload files using the admin web interface. An attacker can remotely compromise any Toshiba printer. An attacker can overwrite any insecure files. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL.

Action-Not Available
Vendor-Toshiba Tec Corporationtoshibatec
Product-Toshiba Tec e-Studio multi-function peripheral (MFP)e-studio-4528-age-studio-2020_ace-studio-3115-nce-studio-2110-ace-studio-2015-nce-studio-3015-nce-studio-2510-ace-studio-3028-ae-studio-5525_ace-studio-5528-ae-studio-2515-nce-studio-4515_ace-studio-2518_ae-studio-400-ace-studio-3118_ae-studio-3525_ace-studio-3118_age-studio-2528-ae-studio-4615_ace-studio-2520_nce-studio-2618_ae-studio-9029-ae-studio-3018_ae-studio-7527-ace-studio-4525_ace-studio-2018_ae-studio-2021_ace-studio-2521_ace-studio-3025_ace-studio-6525_ace-studio-3528-age-studio-6527-ace-studio-2610-ace-studio-5015_ace-studio-6529-ae-studio-3515-nce-studio-6528-ae-studio-3528-ae-studio-3615-nce-studio-7529-ae-studio-2010-ace-studio-4528-ae-studio-2615-nce-studio-6526-ace-studio-5525_acge-studio-330-ace-studio-5115_ace-studio-2525_ace-studio-6525_acge-studio-3525_acg
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-27173
Matching Score-8
Assigner-Toshiba Corporation
ShareView Details
Matching Score-8
Assigner-Toshiba Corporation
CVSS Score-9.8||CRITICAL
EPSS-38.88% / 97.16%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 04:01
Updated-13 Feb, 2025 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
insecure upload

Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL.

Action-Not Available
Vendor-Toshiba Tec Corporation
Product-Toshiba Tec e-Studio multi-function peripheral (MFP)
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-27172
Matching Score-8
Assigner-Toshiba Corporation
ShareView Details
Matching Score-8
Assigner-Toshiba Corporation
CVSS Score-9.8||CRITICAL
EPSS-44.47% / 97.47%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 04:00
Updated-13 Feb, 2025 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Remote Code Execution

Remote Command program allows an attacker to get Remote Code Execution. As for the affected products/models/versions, see the reference URL.

Action-Not Available
Vendor-Toshiba Tec Corporationtoshibatec
Product-Toshiba Tec e-Studio multi-function peripheral (MFP)e-studio-4528-age-studio-2020_ace-studio-3115-nce-studio-2110-ace-studio-2015-nce-studio-3015-nce-studio-2510-ace-studio-3028-ae-studio-5525_ace-studio-5528-ae-studio-2515-nce-studio-4515_ace-studio-2518_ae-studio-400-ace-studio-3118_ae-studio-3525_ace-studio-3118_age-studio-2528-ae-studio-4615_ace-studio-2520_nce-studio-2618_ae-studio-9029-ae-studio-3018_ae-studio-7527-ace-studio-4525_ace-studio-2018_ae-studio-2021_ace-studio-2521_ace-studio-3025_ace-studio-6525_ace-studio-3528-age-studio-6527-ace-studio-2610-ace-studio-5015_ace-studio-6529-ae-studio-3515-nce-studio-6528-ae-studio-3528-ae-studio-3615-nce-studio-7529-ae-studio-2010-ace-studio-4528-ae-studio-2615-nce-studio-6526-ace-studio-5525_acge-studio-330-ace-studio-5115_ace-studio-2525_ace-studio-6525_acge-studio-3525_acg
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-7077
Matching Score-8
Assigner-NEC Corporation
ShareView Details
Matching Score-8
Assigner-NEC Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.75% / 72.16%
||
7 Day CHG~0.00%
Published-05 Feb, 2024 | 06:57
Updated-15 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sharp NEC Displays (P403, P463, P553, P703, P801, X554UN, X464UN, X554UNS, X464UNV, X474HB, X464UNS, X554UNV, X555UNS, X555UNV, X754HB, X554HB, E705, E805, E905, UN551S, UN551VS, X551UHD, X651UHD, X841UHD, X981UHD, MD551C8) allows an attacker execute remote code by sending unintended parameters in http request.

Action-Not Available
Vendor-sharpSharp NEC Display Solutions, Ltd.
Product-nec_x554uns_firmwarenec_x651uhdnec_un551s_firmwarenec_x841uhdnec_p801_firmwarenec_x464unnec_e905_firmwarenec_x554hb_firmwarenec_x554un_firmwarenec_p463nec_x554unv_firmwarenec_x555unv_firmwarenec_x554hbnec_x555uns_firmwarenec_p703_firmwarenec_x554unnec_p553_firmwarenec_x555unsnec_x754hb_firmwarenec_e805nec_un551vs_firmwarenec_x554unsnec_x551uhdnec_p553nec_x464un_firmwarenec_x474hbnec_x464uns_firmwarenec_e905nec_e705_firmwarenec_x554unvnec_x981uhd_firmwarenec_p463_firmwarenec_p403_firmwarenec_x464unvnec_e705nec_x981uhdnec_md551c8nec_p801nec_un551snec_x474hb_firmwarenec_x555unvnec_x464unv_firmwarenec_p703nec_x464unsnec_p403nec_md551c8_firmwarenec_x841uhd_firmwarenec_x651uhd_firmwarenec_e805_firmwarenec_un551vsnec_x754hbnec_x551uhd_firmwareP403, P463, P553, P703, P801, X554UN, X464UN, X554UNS, X464UNV, X474HB, X464UNS, X554UNV, X555UNS, X555UNV, X754HB, X554HB, E705, E805, E905, UN551S, UN551VS, X551UHD, X651UHD, X841UHD, X981UHD, MD551C8
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-3929
Matching Score-8
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-8
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-93.99% / 99.88%
||
7 Day CHG-0.05%
Published-30 Apr, 2019 | 20:21
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-06||Apply updates per vendor instructions.

The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.

Action-Not Available
Vendor-teqavitextronblackboxbarcooptomainfocussharpCrestron Electronics, Inc.
Product-pn-l703waam-100_firmwaresharelink_250wips710sharelink_200_firmwarewps-proam-100hd_wireless_presentation_systemwepresent_wipg-1600w_firmwareliteshow3_firmwarewepresent_wipg-1600wwepresent_wipg-1000pliteshow4_firmwarepn-l703wa_firmwarehd_wireless_presentation_system_firmwaream-101_firmwarewps-pro_firmwarewips710_firmwaresharelink_250_firmwaresharelink_200liteshow3wepresent_wipg-1000p_firmwareliteshow4am-101Crestron AirMedia, Barco WePresent, Extron ShareLink, Teq AV IT WIPS710, SHARP PN-L703WA, Optoma WPS-Pro, Blackbox HD WPS, InFocus LiteShow3, and InFocus LiteShow4.Multiple Products
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-3930
Matching Score-8
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-8
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-15.34% / 94.36%
||
7 Day CHG~0.00%
Published-30 Apr, 2019 | 20:25
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to a stack buffer overflow in libAwgCgi.so's PARSERtoCHAR function. A remote, unauthenticated attacker can use this vulnerability to execute arbitrary code as root via a crafted request to the return.cgi endpoint.

Action-Not Available
Vendor-teqavitextronblackboxbarcoinfocusoptomasharpCrestron Electronics, Inc.
Product-am-101wepresent_wipg-1600w_firmwaream-101_firmwarepn-l703wa_firmwarehd_wireless_presentation_system_firmwareliteshow4wips710_firmwareliteshow3sharelink_200_firmwarepn-l703waam-100wips710sharelink_250_firmwarehd_wireless_presentation_systemliteshow4_firmwarewps-pro_firmwaresharelink_200am-100_firmwarewepresent_wipg-1000p_firmwarewepresent_wipg-1600wwps-prowepresent_wipg-1000pliteshow3_firmwaresharelink_250Crestron AirMedia, Barco WePresent, Extron ShareLink, Teq AV IT WIPS710, SHARP PN-L703WA, Optoma WPS-Pro, Blackbox HD WPS, InFocus LiteShow3, and InFocus LiteShow4.
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-27143
Matching Score-8
Assigner-Toshiba Corporation
ShareView Details
Matching Score-8
Assigner-Toshiba Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 34.69%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 02:29
Updated-13 Feb, 2025 | 17:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pre-authenticated Remote Code Execution

Toshiba printers use SNMP for configuration. Using the private community, it is possible to remotely execute commands as root on the remote printer. Using this vulnerability will allow any attacker to get a root access on a remote Toshiba printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL.

Action-Not Available
Vendor-Toshiba Tec Corporationtoshibatec
Product-Toshiba Tec e-Studio multi-function peripheral (MFP)e-studio-4528-age-studio-2020_ace-studio-3115-nce-studio-2110-ace-studio-2015-nce-studio-3015-nce-studio-2510-ace-studio-3028-ae-studio-5525_ace-studio-5528-ae-studio-2515-nce-studio-4515_ace-studio-2518_ae-studio-400-ace-studio-3118_ae-studio-3525_ace-studio-3118_age-studio-2528-ae-studio-4615_ace-studio-2520_nce-studio-2618_ae-studio-9029-ae-studio-3018_ae-studio-7527-ace-studio-4525_ace-studio-2018_ae-studio-2021_ace-studio-2521_ace-studio-3025_ace-studio-6525_ace-studio-3528-age-studio-6527-ace-studio-2610-ace-studio-5015_ace-studio-6529-ae-studio-3515-nce-studio-6528-ae-studio-3528-ae-studio-3615-nce-studio-7529-ae-studio-2010-ace-studio-4528-ae-studio-2615-nce-studio-6526-ace-studio-5525_acge-studio-330-ace-studio-5115_ace-studio-2525_ace-studio-6525_acge-studio-3525_acg
CWE ID-CWE-250
Execution with Unnecessary Privileges
CVE-2024-27169
Matching Score-6
Assigner-Toshiba Corporation
ShareView Details
Matching Score-6
Assigner-Toshiba Corporation
CVSS Score-8.4||HIGH
EPSS-0.03% / 6.05%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 03:55
Updated-13 Feb, 2025 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lack of authentication

Toshiba printers provides API without authentication for internal access. A local attacker can bypass authentication in applications, providing administrative access. As for the affected products/models/versions, see the reference URL.

Action-Not Available
Vendor-Toshiba Tec Corporationtoshibatec
Product-Toshiba Tec e-Studio multi-function peripheral (MFP)e-studio-4528-age-studio-2020_ace-studio-3115-nce-studio-2110-ace-studio-2015-nce-studio-3015-nce-studio-2510-ace-studio-3028-ae-studio-5525_ace-studio-5528-ae-studio-2515-nce-studio-4515_ace-studio-2518_ae-studio-400-ace-studio-3118_ae-studio-3525_ace-studio-3118_age-studio-2528-ae-studio-4615_ace-studio-2520_nce-studio-2618_ae-studio-9029-ae-studio-3018_ae-studio-7527-ace-studio-4525_ace-studio-2018_ae-studio-2021_ace-studio-2521_ace-studio-3025_ace-studio-6525_ace-studio-3528-age-studio-6527-ace-studio-2610-ace-studio-5015_ace-studio-6529-ae-studio-3515-nce-studio-6528-ae-studio-3528-ae-studio-3615-nce-studio-7529-ae-studio-2010-ace-studio-4528-ae-studio-2615-nce-studio-6526-ace-studio-5525_acge-studio-330-ace-studio-5115_ace-studio-2525_ace-studio-6525_acge-studio-3525_acg
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-23783
Matching Score-6
Assigner-JPCERT/CC
ShareView Details
Matching Score-6
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.24% / 46.77%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 10:02
Updated-25 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to access the affected product without authentication.

Action-Not Available
Vendor-sharpSHARP CORPORATION
Product-jh-rvb1_firmwarejh-rvb1jh-rv11_firmwarejh-rv11Energy Management Controller with Cloud Services
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-21824
Matching Score-6
Assigner-JPCERT/CC
ShareView Details
Matching Score-6
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 14.22%
||
7 Day CHG~0.00%
Published-18 Mar, 2024 | 08:01
Updated-07 Nov, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in exists in multiple printers and scanners which implement Web Based Management provided by BROTHER INDUSTRIES, LTD. If this vulnerability is exploited, a network-adjacent user who can access the product may impersonate an administrative user. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-FUJIFILM Business Innovation Corp.Toshiba Tec CorporationBrother Industries, Ltd.Ricoh Company, Ltd.
Product-Multiple printers and scanners
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-33610
Matching Score-6
Assigner-JPCERT/CC
ShareView Details
Matching Score-6
Assigner-JPCERT/CC
CVSS Score-9.1||CRITICAL
EPSS-76.85% / 98.91%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 07:37
Updated-10 Dec, 2024 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

"sessionlist.html" and "sys_trayentryreboot.html" are accessible with no authentication. "sessionlist.html" provides logged-in users' session information including session cookies, and "sys_trayentryreboot.html" allows to reboot the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2024-3496
Matching Score-6
Assigner-Toshiba Corporation
ShareView Details
Matching Score-6
Assigner-Toshiba Corporation
CVSS Score-8.8||HIGH
EPSS-0.05% / 15.99%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 04:13
Updated-19 Aug, 2024 | 12:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass Vulnerability

Attackers can bypass the web login authentication process to gain access to the printer's system information and upload malicious drivers to the printer. As for the affected products/models/versions, see the reference URL.

Action-Not Available
Vendor-Toshiba Tec Corporationtoshibatec
Product-Toshiba Tec e-Studio multi-function peripheral (MFP)e-studio-3028-ae-studio-3525_ace-studio-4615_ace-studio-2525_ace-studio-2010-ace-studio-6525_acge-studio-3525_acge-studio-5528-ae-studio-2615-nce-studio-3015-nce-studio-3528-ae-studio-6528-ae-studio-3528-age-studio-6526-ace-studio-2518_ae-studio-4528-ae-studio-6525_ace-studio-7527-ace-studio-3018_ae-studio-2521_ace-studio-9029-ae-studio-400-ace-studio-2020_ace-studio-2520_nce-studio-2510-ace-studio-4528-age-studio-2610-ace-studio-3615-nce-studio-2618_ae-studio-7529-ae-studio-2110-ace-studio-6529-ae-studio-3025_ace-studio-2021_ace-studio-5115_ace-studio-3118_age-studio-5525_acge-studio-5015_ace-studio-3118_ae-studio-2018_ae-studio-4515_ace-studio-3115-nce-studio-3515-nce-studio-2528-ae-studio-2015-nce-studio-4525_ace-studio-2515-nce-studio-330-ace-studio-5525_ace-studio-6527-ac
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2024-33616
Matching Score-6
Assigner-JPCERT/CC
ShareView Details
Matching Score-6
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 29.00%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 07:37
Updated-10 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Admin authentication can be bypassed with some specific invalid credentials, which allows logging in with an administrative privilege. Sharp Corporation states the telnet feature is implemented on older models only, and is planning to provide the firmware update to remove the feature. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-3897
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-9.8||CRITICAL
EPSS-0.36% / 57.66%
||
7 Day CHG~0.00%
Published-22 Apr, 2022 | 21:10
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability was discovered in an internal service of the Lenovo Fan Power Controller2 (FPC2) and Lenovo System Management Module (SMM) firmware during an that could allow an unauthenticated attacker to execute commands on the SMM and FPC2. SMM2 is not affected.

Action-Not Available
Vendor-IBM CorporationLenovo Group Limited
Product-thinkagile_vx_enclosurenextscale_n1200_enclosure_firmwarethinkagile_hx_enclosure_certified_nodethinksystem_d2_enclosure_firmwarenextscale_fan_power_controller_firmwarenextscale_fan_power_controllerthinksystem_d2_enclosurethinkagile_vx_enclosure_firmwarenextscale_n1200_enclosurethinkagile_hx_enclosure_certified_node_firmwareFan Power Controller2 (FPC2)Lenovo System Management Module (SMM)
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-8284
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.08% / 24.30%
||
7 Day CHG~0.00%
Published-08 Aug, 2025 | 16:27
Updated-08 Aug, 2025 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Packet Power EMX and EG Missing Authentication for Critical Function

By default, the Packet Power Monitoring and Control Web Interface do not enforce authentication mechanisms. This vulnerability could allow unauthorized users to access and manipulate monitoring and control functions.

Action-Not Available
Vendor-Packet Power
Product-EMXEG
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-9254
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.3||CRITICAL
EPSS-0.15% / 36.80%
||
7 Day CHG~0.00%
Published-22 Aug, 2025 | 11:21
Updated-22 Aug, 2025 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Uniong|WebITR - Missing Authentication

WebITR developed by Uniong has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to log into the system as arbitrary users by exploiting a specific functionality.

Action-Not Available
Vendor-Uniong
Product-WebITR
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-8995
Matching Score-4
Assigner-Drupal.org
ShareView Details
Matching Score-4
Assigner-Drupal.org
CVSS Score-9.8||CRITICAL
EPSS-0.09% / 26.98%
||
7 Day CHG+0.02%
Published-15 Aug, 2025 | 16:27
Updated-21 Aug, 2025 | 19:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authenticator Login - Highly critical - Access bypass - SA-CONTRIB-2025-096

Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Authenticator Login allows Authentication Bypass.This issue affects Authenticator Login: from 0.0.0 before 2.1.4.

Action-Not Available
Vendor-authenticator_login_projectThe Drupal Association
Product-authenticator_loginAuthenticator Login
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-20136
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-31.40% / 96.62%
||
7 Day CHG~0.00%
Published-01 Nov, 2021 | 20:55
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ManageEngine Log360 Builds < 5235 are affected by an improper access control vulnerability allowing database configuration overwrite. An unauthenticated remote attacker can send a specially crafted message to Log360 to change its backend database to an attacker-controlled database and to force Log360 to restart. An attacker can leverage this vulnerability to achieve remote code execution by replacing files executed by Log360 on startup.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.
Product-manageengine_log360ManageEngine Log360
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-38412
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.6||CRITICAL
EPSS-0.16% / 37.00%
||
7 Day CHG~0.00%
Published-17 Sep, 2021 | 19:07
Updated-17 Sep, 2024 | 00:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Digi PortServer TS 16 Improper Authentication

Properly formatted POST requests to multiple resources on the HTTP and HTTPS web servers of the Digi PortServer TS 16 Rack device do not require authentication or authentication tokens. This vulnerability could allow an attacker to enable the SNMP service and manipulate the community strings to achieve further control in.

Action-Not Available
Vendor-digiDigi International
Product-portserver_ts_16_firmwareportserver_ts_16PortServer TS 16
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-20126
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-70.19% / 98.62%
||
7 Day CHG~0.00%
Published-04 May, 2023 | 00:00
Updated-28 Oct, 2024 | 16:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SPA112 2-Port Phone Adapters Remote Command Execution Vulnerability

A vulnerability in the web-based management interface of Cisco SPA112 2-Port Phone Adapters could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to a missing authentication process within the firmware upgrade function. An attacker could exploit this vulnerability by upgrading an affected device to a crafted version of firmware. A successful exploit could allow the attacker to execute arbitrary code on the affected device with full privileges. Cisco has not released firmware updates to address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-spa112_firmwarespa112Cisco Small Business IP Phones
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-8943
Matching Score-4
Assigner-JFrog
ShareView Details
Matching Score-4
Assigner-JFrog
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 18.84%
||
7 Day CHG+0.01%
Published-14 Aug, 2025 | 09:54
Updated-18 Aug, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unsupervised OS command execution leads to remote code execution by unauthenticated network attackers

The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.

Action-Not Available
Vendor-
Product-
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-862
Missing Authorization
CVE-2021-38540
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-89.91% / 99.55%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 15:05
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Airflow: Variable Import endpoint missed authentication check

The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airflow >=2.0.0, <2.1.3.

Action-Not Available
Vendor-The Apache Software Foundation
Product-airflowApache Airflow
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-38457
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.27% / 50.47%
||
7 Day CHG~0.00%
Published-22 Oct, 2021 | 11:23
Updated-16 Sep, 2024 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AUVESY Versiondog

The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication.

Action-Not Available
Vendor-auvesyAUVESY
Product-versiondogVersiondog
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-7710
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.30% / 52.43%
||
7 Day CHG~0.00%
Published-02 Aug, 2025 | 11:23
Updated-04 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Brave Conversion Engine (PRO) <= 0.7.7 - Authentication Bypass to Administrator

The Brave Conversion Engine (PRO) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 0.7.7. This is due to the plugin not properly restricting a claimed identity while authenticating with Facebook. This makes it possible for unauthenticated attackers to log in as other users, including administrators.

Action-Not Available
Vendor-Brave
Product-Brave Conversion Engine (PRO)
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2024-27198
Matching Score-4
Assigner-JetBrains s.r.o.
ShareView Details
Matching Score-4
Assigner-JetBrains s.r.o.
CVSS Score-9.8||CRITICAL
EPSS-94.58% / 100.00%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 17:21
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-03-28||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible

Action-Not Available
Vendor-JetBrains s.r.o.
Product-teamcityTeamCityteamcityTeamCity
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-8279
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-8.7||HIGH
EPSS-0.02% / 3.75%
||
7 Day CHG~0.00%
Published-28 Jul, 2025 | 14:04
Updated-11 Aug, 2025 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authentication for Critical Function in GitLab Language Server

Insufficient input validation within GitLab Language Server 7.6.0 and later before 7.30.0 allows arbitrary GraphQL query execution

Action-Not Available
Vendor-GitLab Inc.
Product-language_serverGitLab Language Server
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-26011
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-5.2||MEDIUM
EPSS-0.04% / 13.09%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 18:53
Updated-12 Dec, 2024 | 19:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A missing authentication for critical function in Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14, FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.0 through 7.0.3, FortiPortal version 6.0.0 through 6.0.14, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted packets.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortimanagerfortiswitchmanagerfortiportalfortipamfortiproxyfortiosFortiProxyFortiSwitchManagerFortiPortalFortiPAMFortiOSFortiManager
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-1096
Matching Score-4
Assigner-NetApp, Inc.
ShareView Details
Matching Score-4
Assigner-NetApp, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.69% / 70.78%
||
7 Day CHG~0.00%
Published-12 May, 2023 | 00:00
Updated-27 Jan, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SnapCenter versions 4.7 prior to 4.7P2 and 4.8 prior to 4.8P1 are susceptible to a vulnerability which could allow a remote unauthenticated attacker to gain access as an admin user.

Action-Not Available
Vendor-n/aNetApp, Inc.
Product-snapcenterSnapCenter
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-1083
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.33% / 54.95%
||
7 Day CHG~0.00%
Published-09 Apr, 2024 | 08:25
Updated-02 Oct, 2024 | 06:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Welotec: improper access control in TK500v1 router series

An unauthenticated remote attacker who is aware of a MQTT topic name can send and receive messages, including GET/SET configuration commands, reboot commands and firmware updates.

Action-Not Available
Vendor-Welotecwelotec
Product-TK525U SetTK525LTK525L SetTK515L-W SetTK525WTK515L-WTK515L SetTK535L1 SetTK525L-WTK525L-W SetTK515LTK535L1TK525W SetTK525Utk525ltk515ltk525wtk525utk535l1
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-0906
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-7.3||HIGH
EPSS-0.06% / 17.21%
||
7 Day CHG~0.00%
Published-18 Feb, 2023 | 07:41
Updated-02 Aug, 2024 | 05:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Online Pizza Ordering System POST Parameter ajax.php delete_category missing authentication

A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. Affected by this vulnerability is the function delete_category of the file ajax.php of the component POST Parameter Handler. The manipulation leads to missing authentication. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-221455.

Action-Not Available
Vendor-oretnom23SourceCodester
Product-online_pizza_ordering_systemOnline Pizza Ordering System
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-0052
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.09% / 25.72%
||
7 Day CHG~0.00%
Published-20 Jan, 2023 | 21:23
Updated-16 Jan, 2025 | 21:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SAUTER Controls Nova 200–220 Series Missing Authentication for Critical Function

SAUTER Controls Nova 200–220 Series with firmware version 3.3-006 and prior and BACnetstac version 4.2.1 and prior allows the execution of commands without credentials. As Telnet and file transfer protocol (FTP) are the only protocols available for device management, an unauthorized user could access the system and modify the device configuration, which could result in the unauthorized user executing unrestricted malicious commands.

Action-Not Available
Vendor-sauter-controlsSAUTER Controls
Product-modunet300_ey-am300f001nova_230_eyk230f001_firmwarenova_106_eyk300f001nova_220_eyk220f001_firmwarenova_106_eyk300f001_firmwaremodunet300_ey-am300f002nova_220_eyk220f001nova_230_eyk230f001modunet300_ey-am300f002_firmwaremodunet300_ey-am300f001_firmwaremoduNet300 (EY-AM300F001, EY-AM300F002)Nova 220 (EYK220F001) DDC with BACnet connectionNova 106 (EYK300F001) BACnet communication cardNova 230 (EYK230F001) DDC with BACnet connection
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-6895
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.36% / 57.06%
||
7 Day CHG+0.09%
Published-26 Jul, 2025 | 04:25
Updated-29 Jul, 2025 | 14:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MelaPress Login Security 2.1.0 - 2.1.1 - Authentication Bypass to Privilege Escalation via get_valid_user_based_on_token Function

The Melapress Login Security plugin for WordPress is vulnerable to Authentication Bypass due to missing authorization within the get_valid_user_based_on_token() function in versions 2.1.0 to 2.1.1. This makes it possible for unauthenticated attackers who know an arbitrary user meta value to bypass authentication checks and log in as that user.

Action-Not Available
Vendor-melapress
Product-Melapress Login Security
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2024-23917
Matching Score-4
Assigner-JetBrains s.r.o.
ShareView Details
Matching Score-4
Assigner-JetBrains s.r.o.
CVSS Score-9.8||CRITICAL
EPSS-94.30% / 99.94%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 09:21
Updated-01 Aug, 2024 | 23:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity before 2023.11.3 authentication bypass leading to RCE was possible

Action-Not Available
Vendor-JetBrains s.r.o.
Product-teamcityTeamCityteamcity
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-7642
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 40.47%
||
7 Day CHG~0.00%
Published-23 Aug, 2025 | 04:25
Updated-25 Aug, 2025 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Simpler Checkout 0.7.0 - 1.1.9 - Authentication Bypass

The Simpler Checkout plugin for WordPress is vulnerable to Authentication Bypass in versions 0.7.0 to 1.1.9. This is due to the plugin not properly verifying a user's identity prior to logging them in as an admin through the simplerwc_woocommerce_order_created() function. This makes it possible for unauthenticated attackers to log in as other users based on their order ID, which can be an administrator if a site admin has placed a test order.

Action-Not Available
Vendor-simplercheckout
Product-Simpler Checkout
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-7444
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.42% / 61.23%
||
7 Day CHG~0.00%
Published-18 Jul, 2025 | 08:22
Updated-22 Jul, 2025 | 13:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LoginPress Pro <= 5.0.1 - Authentication Bypass via WordPress.com OAuth provider

The LoginPress Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.0.1. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.

Action-Not Available
Vendor-LoginPress
Product-LoginPress Pro
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-6688
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.45% / 62.48%
||
7 Day CHG~0.00%
Published-27 Jun, 2025 | 07:22
Updated-02 Jul, 2025 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Simple Payment 1.3.6 - 2.3.8 - Authentication Bypass to Admin

The Simple Payment plugin for WordPress is vulnerable to Authentication Bypass in versions 1.3.6 to 2.3.8. This is due to the plugin not properly verifying a user's identity prior to logging them in through the create_user() function. This makes it possible for unauthenticated attackers to log in as administrative users.

Action-Not Available
Vendor-idokdidokd
Product-simple_paymentSimple Payment
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-5906
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.36% / 57.29%
||
7 Day CHG~0.00%
Published-10 Jun, 2025 | 00:31
Updated-13 Jun, 2025 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Laundry System data missing authentication

A vulnerability classified as critical has been found in code-projects Laundry System 1.0. This affects an unknown part of the file /data/. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Source Code & Projects
Product-laundry_systemLaundry System
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-3849
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-9.8||CRITICAL
EPSS-0.51% / 65.24%
||
7 Day CHG~0.00%
Published-22 Apr, 2022 | 21:10
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability was discovered in the web interface of the Lenovo Fan Power Controller2 (FPC2) and Lenovo System Management Module (SMM) firmware that could allow an unauthenticated attacker to execute commands on the SMM and FPC2. SMM2 is not affected.

Action-Not Available
Vendor-IBM CorporationLenovo Group Limited
Product-thinkagile_vx_enclosurenextscale_n1200_enclosure_firmwarethinkagile_hx_enclosure_certified_nodethinksystem_d2_enclosure_firmwarenextscale_fan_power_controller_firmwarenextscale_fan_power_controllerthinksystem_d2_enclosurethinkagile_vx_enclosure_firmwarenextscale_n1200_enclosurethinkagile_hx_enclosure_certified_node_firmwareFan Power Controller2 (FPC2)Lenovo System Management Module (SMM)
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2024-23618
Matching Score-4
Assigner-Exodus Intelligence
ShareView Details
Matching Score-4
Assigner-Exodus Intelligence
CVSS Score-9.6||CRITICAL
EPSS-0.27% / 50.50%
||
7 Day CHG~0.00%
Published-25 Jan, 2024 | 23:35
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arris SURFboard SBG6950AC2 Arbitrary Code Execution Vulnerability

An arbitrary code execution vulnerability exists in Arris SURFboard SGB6950AC2 devices. An unauthenticated attacker can exploit this vulnerability to achieve code execution as root.

Action-Not Available
Vendor-commscopeArris
Product-arris_surfboard_sbg6950ac2arris_surfboard_sbg6950ac2_firmwareSURFboard SBG6950AC2
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-47377
Matching Score-4
Assigner-SICK AG
ShareView Details
Matching Score-4
Assigner-SICK AG
CVSS Score-9.8||CRITICAL
EPSS-1.49% / 80.22%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-16 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Password recovery vulnerability in SICK SIM2000ST Partnumber 2086502 with firmware version <1.13.4 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to an increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The recommended solution is to update the firmware to a version >= 1.13.4 as soon as possible (available in SICK Support Portal).

Action-Not Available
Vendor-n/aSICK AG
Product-sim2000_firmwaresim2000stSICK SIM2000ST (LFT PPC)
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-21855
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 47.40%
||
7 Day CHG~0.00%
Published-21 Nov, 2024 | 14:41
Updated-20 Dec, 2024 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A lack of authentication vulnerability exists in the HTTP API functionality of GoCast 1.1.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.

Action-Not Available
Vendor-mayuresh82GoCastgocast
Product-gocastGoCastgocast
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-11028
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-1.02% / 76.29%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 09:30
Updated-19 Nov, 2024 | 15:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MultiManager WP – Manage All Your WordPress Sites Easily <= 1.0.5 - Authentication Bypass via User Impersonation

The MultiManager WP – Manage All Your WordPress Sites Easily plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.5. This is due to the user impersonation feature inappropriately determining the current user via user-supplied input. This makes it possible for unauthenticated attackers to generate an impersonation link that will allow them to log in as any existing user, such as an administrator. NOTE: The user impersonation feature was disabled in version 1.1.0 and re-enabled with a patch in version 1.1.2.

Action-Not Available
Vendor-icdsofticdsofticdsoft
Product-multimanager_wpMultiManager WP – Manage All Your WordPress Sites Easilymultimanager_wp_manage_all_your_word_press_sites_easily
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2024-22212
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.7||CRITICAL
EPSS-1.15% / 77.62%
||
7 Day CHG~0.00%
Published-18 Jan, 2024 | 19:04
Updated-11 Sep, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nextcloud global site selector authentication bypass

Nextcloud Global Site Selector is a tool which allows you to run multiple small Nextcloud instances and redirect users to the right server. A problem in the password verification method allows an attacker to authenticate as another user. It is recommended that the Nextcloud Global Site Selector is upgraded to version 1.4.1, 2.1.2, 2.3.4 or 2.4.5. There are no known workarounds for this issue.

Action-Not Available
Vendor-Nextcloud GmbH
Product-global_site_selectorsecurity-advisories
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-22415
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.17% / 38.25%
||
7 Day CHG~0.00%
Published-18 Jan, 2024 | 20:27
Updated-10 Sep, 2024 | 20:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unsecured endpoints in the jupyter-lsp server extension

jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp.

Action-Not Available
Vendor-jupyterjupyter-lsp
Product-language_server_protocol_integrationjupyterlab-lsp
CWE ID-CWE-23
Relative Path Traversal
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-5821
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 34.51%
||
7 Day CHG~0.00%
Published-23 Aug, 2025 | 06:43
Updated-25 Aug, 2025 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Case Theme User <= 1.0.3 - Authentication Bypass via Social Login

The Case Theme User plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.3. This is due to the plugin not properly logging a user in with the data that was previously verified through the facebook_ajax_login_callback(). This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site, and access to the administrative user's email.

Action-Not Available
Vendor-Case-Themes
Product-Case Theme User
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2022-45933
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-91.29% / 99.64%
||
7 Day CHG~0.00%
Published-27 Nov, 2022 | 00:00
Updated-29 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure."

Action-Not Available
Vendor-kubeview_projectn/a
Product-kubeviewn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-2056
Matching Score-4
Assigner-Austin Hackers Anonymous
ShareView Details
Matching Score-4
Assigner-Austin Hackers Anonymous
CVSS Score-9.8||CRITICAL
EPSS-5.43% / 89.77%
||
7 Day CHG~0.00%
Published-05 Mar, 2024 | 18:57
Updated-13 Feb, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Artica Proxy Loopback Services Remotely Accessible Unauthenticated

Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.

Action-Not Available
Vendor-Artica Tech SARL
Product-Artica Proxyartica_proxy
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2022-45481
Matching Score-4
Assigner-Black Duck Software, Inc.
ShareView Details
Matching Score-4
Assigner-Black Duck Software, Inc.
CVSS Score-9.8||CRITICAL
EPSS-2.65% / 85.16%
||
7 Day CHG~0.00%
Published-05 Dec, 2022 | 00:00
Updated-24 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The default configuration of Lazy Mouse does not require a password, allowing remote unauthenticated users to execute arbitrary code with no prior authorization or authentication. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Action-Not Available
Vendor-lzmousethisAAY
Product-lazy_mouseLazy Mouse
CWE ID-CWE-306
Missing Authentication for Critical Function
Details not found