Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-70146

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-18 Feb, 2026 | 00:00
Updated At-18 Feb, 2026 | 18:37
Rejected At-
Credits

Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via direct HTTP requests to affected endpoints without a valid session.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:18 Feb, 2026 | 00:00
Updated At:18 Feb, 2026 | 18:37
Rejected At:
▼CVE Numbering Authority (CNA)

Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via direct HTTP requests to affected endpoints without a valid session.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://projectworlds.com/online-time-table-generator-php-mysql/
N/A
https://youngkevinn.github.io/posts/CVE-2025-70146-OTTTG-Unauth-Deletion/
N/A
Hyperlink: https://projectworlds.com/online-time-table-generator-php-mysql/
Resource: N/A
Hyperlink: https://youngkevinn.github.io/posts/CVE-2025-70146-OTTTG-Unauth-Deletion/
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-306CWE-306 Missing Authentication for Critical Function
CWECWE-862CWE-862 Missing Authorization
Type: CWE
CWE ID: CWE-306
Description: CWE-306 Missing Authentication for Critical Function
Type: CWE
CWE ID: CWE-862
Description: CWE-862 Missing Authorization
Metrics
VersionBase scoreBase severityVector
3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:18 Feb, 2026 | 17:21
Updated At:20 Feb, 2026 | 20:07

Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via direct HTTP requests to affected endpoints without a valid session.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CPE Matches

Projectworlds
projectworlds
>>online_time_table_generator>>1.0
cpe:2.3:a:projectworlds:online_time_table_generator:1.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-306Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-862Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-306
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-862
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://projectworlds.com/online-time-table-generator-php-mysql/cve@mitre.org
Product
https://youngkevinn.github.io/posts/CVE-2025-70146-OTTTG-Unauth-Deletion/cve@mitre.org
Exploit
Mitigation
Third Party Advisory
Hyperlink: https://projectworlds.com/online-time-table-generator-php-mysql/
Source: cve@mitre.org
Resource:
Product
Hyperlink: https://youngkevinn.github.io/posts/CVE-2025-70146-OTTTG-Unauth-Deletion/
Source: cve@mitre.org
Resource:
Exploit
Mitigation
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

73Records found

CVE-2025-70147
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.28% / 51.38%
||
7 Day CHG~0.00%
Published-18 Feb, 2026 | 00:00
Updated-20 Feb, 2026 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests to these endpoints without a valid session.

Action-Not Available
Vendor-n/aProjectworlds
Product-online_time_table_generatorn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-862
Missing Authorization
CVE-2022-46838
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-9.1||CRITICAL
EPSS-0.39% / 59.77%
||
7 Day CHG~0.00%
Published-13 Dec, 2024 | 14:22
Updated-28 Apr, 2026 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress JS Help Desk plugin <= 2.7.1 - Unauthenticated Settings Change Vulnerability

Missing Authorization vulnerability in JS Help Desk JS Help Desk – Best Help Desk & Support Plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JS Help Desk – Best Help Desk & Support Plugin: from n/a through 2.7.1.

Action-Not Available
Vendor-joomskyJS Help Desk
Product-js_help_deskJS Help Desk – Best Help Desk & Support Plugin
CWE ID-CWE-862
Missing Authorization
CVE-2026-5574
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.05% / 15.25%
||
7 Day CHG+0.03%
Published-05 Apr, 2026 | 14:45
Updated-01 May, 2026 | 13:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Technostrobe HI-LED-WR120-G2 FsBrowseClean deletefile authorization

A security vulnerability has been detected in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. Affected is the function deletefile of the component FsBrowseClean. The manipulation of the argument dir/path leads to missing authorization. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-technostrobeTechnostrobe
Product-hi-led-wr120-g2hi-led-wr120-g2_firmwareHI-LED-WR120-G2
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2026-4365
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.1||CRITICAL
EPSS-0.07% / 21.30%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 01:24
Updated-22 Apr, 2026 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LearnPress <= 4.3.2.8 - Missing Authorization to Unauthenticated Arbitrary Quiz Answer Deletion

The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function in all versions up to, and including, 4.3.2.8. The plugin exposes a `wp_rest` nonce in public frontend HTML (`lpData`) to unauthenticated visitors, and uses that nonce as the only security gate for the `lp-load-ajax` AJAX dispatcher. The `delete_question_answer` action has no capability or ownership check. This makes it possible for unauthenticated attackers to delete any quiz answer option by sending a crafted POST request with a publicly available nonce.

Action-Not Available
Vendor-ThimPress (PhysCode)
Product-LearnPress – WordPress LMS Plugin for Create and Sell Online Courses
CWE ID-CWE-862
Missing Authorization
CVE-2026-4283
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.1||CRITICAL
EPSS-0.20% / 41.16%
||
7 Day CHG~0.00%
Published-24 Mar, 2026 | 04:27
Updated-24 Apr, 2026 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP DSGVO Tools (GDPR) <= 3.1.38 - Missing Authorization to Unauthenticated Account Destruction of Non-Admin Users

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for unauthenticated attackers to permanently destroy any non-administrator user account (password randomized, username/email overwritten, roles stripped, comments anonymized, sensitive usermeta wiped) by submitting the victim's email address with `process_now=1`. The nonce required for the request is publicly available on any page containing the `[unsubscribe_form]` shortcode.

Action-Not Available
Vendor-legalweb
Product-WP DSGVO Tools (GDPR)
CWE ID-CWE-862
Missing Authorization
CVE-2026-4119
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.1||CRITICAL
EPSS-0.03% / 7.68%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 07:45
Updated-22 Apr, 2026 | 20:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Create DB Tables <= 1.2.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Database Table Creation/Deletion via admin-post.php

The Create DB Tables plugin for WordPress is vulnerable to authorization bypass in all versions up to and including 1.2.1. The plugin registers admin_post action hooks for creating tables (admin_post_add_table) and deleting tables (admin_post_delete_db_table) without implementing any capability checks via current_user_can() or nonce verification via wp_verify_nonce()/check_admin_referer(). The admin_post hook only requires the user to be logged in, meaning any authenticated user including Subscribers can access these endpoints. The cdbt_delete_db_table() function takes a user-supplied table name from $_POST['db_table'] and executes a DROP TABLE SQL query, allowing any authenticated attacker to delete any database table including critical WordPress core tables such as wp_users or wp_options. The cdbt_create_new_table() function similarly allows creating arbitrary tables. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary database tables and delete any existing database table, potentially destroying the entire WordPress installation.

Action-Not Available
Vendor-jppreus
Product-Create DB Tables
CWE ID-CWE-862
Missing Authorization
CVE-2026-32817
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.19% / 40.50%
||
7 Day CHG+0.05%
Published-20 Mar, 2026 | 02:01
Updated-23 Mar, 2026 | 13:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Admidio is Missing Authorization and CSRF Protection on Document and Folder Deletion

Admidio is an open-source user management solution. In versions 5.0.0 through 5.0.6, the documents and files module does not verify whether the current user has permission to delete folders or files. The folder_delete and file_delete action handlers in modules/documents-files.php only perform a VIEW authorization check (getFolderForDownload / getFileForDownload) before calling delete(), and they never validate a CSRF token. Because the target UUIDs are read from $_GET, deletion can be triggered by a plain HTTP GET request. When the module is in public mode (documents_files_module_enabled = 1) and a folder is marked public (fol_public = true), an unauthenticated attacker can permanently destroy the entire document library. Even when the module requires login, any user with view-only access can delete content they are only permitted to read. This issue has been fixed in version 5.0.7.

Action-Not Available
Vendor-Admidio
Product-admidioadmidio
CWE ID-CWE-862
Missing Authorization
CVE-2026-30970
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.11% / 28.25%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 17:30
Updated-13 Mar, 2026 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Session authentication bypass in Coral Server session creation endpoint

Coral Server is open collaboration infrastructure that enables communication, coordination, trust and payments for The Internet of Agents. Prior to 1.1.0, Coral Server allowed the creation of agent sessions through the /api/v1/sessions endpoint without strong authentication. This endpoint performs resource-intensive initialization operations including container spawning and memory context creation. An attacker capable of accessing the endpoint could create sessions or consume system resources without proper authorization. This vulnerability is fixed in 1.1.0.

Action-Not Available
Vendor-coralosCoral-Protocol
Product-coral_servercoral-server
CWE ID-CWE-862
Missing Authorization
CVE-2025-14829
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-9.1||CRITICAL
EPSS-0.12% / 30.33%
||
7 Day CHG~0.00%
Published-13 Jan, 2026 | 06:00
Updated-02 Apr, 2026 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
e-xact-hosted-payment <= 2.0 - Unauthenticated Arbitrary File Deletion

The E-xact | Hosted Payment | WordPress plugin through 2.0 is vulnerable to arbitrary file deletion due to insufficient file path validation. This makes it possible for unauthenticated attackers to delete arbitrary files on the server.

Action-Not Available
Vendor-Unknown
Product-E-xact | Hosted Payment |
CWE ID-CWE-862
Missing Authorization
CVE-2022-29952
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.27% / 50.74%
||
7 Day CHG~0.00%
Published-26 Jul, 2022 | 21:42
Updated-03 Aug, 2024 | 06:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bently Nevada condition monitoring equipment through 2022-04-29 mishandles authentication. It utilizes the TDI command and data protocols (60005/TCP, 60007/TCP) for communications between the monitoring controller and System 1 and/or Bently Nevada Monitor Configuration (BNMC) software. These protocols provide configuration management and historical data related functionality. Neither protocol has any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality.

Action-Not Available
Vendor-n/aBaker Hughes Company
Product-bently_nevada_3701\/46bently_nevada_60m100_firmwarebently_nevada_3701\/40_firmwarebently_nevada_3701\/40bently_nevada_60m100bently_nevada_3701\/44bently_nevada_3701\/46_firmwarebently_nevada_3701\/44_firmwaren/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-30317
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.30% / 53.46%
||
7 Day CHG~0.00%
Published-31 Aug, 2022 | 15:22
Updated-03 Aug, 2024 | 06:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0055, there is a Honeywell Experion LX Control Data Access (CDA) EpicMo protocol with unauthenticated functionality issue. The affected components are characterized as: Honeywell Control Data Access (CDA) EpicMo (55565/TCP). The potential impact is: Firmware manipulation, Denial of service. The Honeywell Experion LX Distributed Control System (DCS) utilizes the Control Data Access (CDA) EpicMo protocol (55565/TCP) for device diagnostics and maintenance purposes. This protocol does not have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocol in question. An attacker capable of invoking the protocols' functionalities could issue firmware download commands potentially allowing for firmware manipulation and reboot devices causing denial of service.

Action-Not Available
Vendor-n/aHoneywell International Inc.
Product-experion_lx_firmwareexperion_lxn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2026-41473
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.8||HIGH
EPSS-0.72% / 72.45%
||
7 Day CHG+0.11%
Published-24 Apr, 2026 | 20:40
Updated-28 Apr, 2026 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CyberPanel < 2.4.4 Unauthenticated API Access via AI Scanner Endpoints

CyberPanel versions prior to 2.4.4 contain an authentication bypass vulnerability in the AI Scanner worker API endpoints that allows unauthenticated remote attackers to write arbitrary data to the database by sending requests to the /api/ai-scanner/status-webhook and /api/ai-scanner/callback endpoints. Attackers can exploit the lack of authentication checks to cause denial of service through storage exhaustion, corrupt scan history records, and pollute database fields with malicious data.

Action-Not Available
Vendor-usmannasirCyberPersons LLC
Product-cyberpanelcyberpanel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2026-27071
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-9.1||CRITICAL
EPSS-0.06% / 19.20%
||
7 Day CHG~0.00%
Published-25 Mar, 2026 | 16:14
Updated-29 Apr, 2026 | 10:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress WPCafe plugin <= 3.0.7 - Broken Access Control vulnerability

Missing Authorization vulnerability in Arraytics WPCafe wp-cafe allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPCafe: from n/a through <= 3.0.7.

Action-Not Available
Vendor-Arraytics
Product-WPCafe
CWE ID-CWE-862
Missing Authorization
CVE-2026-27843
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.2||CRITICAL
EPSS-0.08% / 22.65%
||
7 Day CHG~0.00%
Published-23 Apr, 2026 | 23:54
Updated-24 Apr, 2026 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SenseLive X3050 Missing authentication for critical function

A vulnerability exists in SenseLive X3050's web management interface that allows critical configuration parameters to be modified without sufficient authentication or server-side validation. By applying unsupported or disruptive values to recovery mechanisms and network settings, an attacker can induce a persistent lockout state. Because the device lacks a physical reset button, recovery requires specialized technical access via the console to perform a factory reset, resulting in a total denial-of-service for the gateway and its connected RS-485 downstream systems.

Action-Not Available
Vendor-SenseLive
Product-X3050
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-27332
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.43% / 62.87%
||
7 Day CHG~0.00%
Published-27 Apr, 2022 | 02:47
Updated-03 Aug, 2024 | 05:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An access control issue in Zammad v5.0.3 allows attackers to write entries to the CTI caller log without authentication. This vulnerability can allow attackers to execute phishing attacks or cause a Denial of Service (DoS).

Action-Not Available
Vendor-zammadn/a
Product-zammadn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-25922
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.1||MEDIUM
EPSS-0.21% / 42.85%
||
7 Day CHG~0.00%
Published-07 Mar, 2022 | 15:28
Updated-16 Apr, 2025 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ICSA-22-063-01 Missing Authentication for Critical Function in Trailer Power Line Communications (PLC) J2497

Power Line Communications PLC4TRUCKS J2497 trailer brake controllers implement diagnostic functions which can be invoked by replaying J2497 messages. There is no authentication or authorization for these functions.

Action-Not Available
Vendor-hegemonelectronicsPower Line Communications
Product-plc4trucks_firmwareplc4trucksPLC4TRUCKS
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-25359
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-27.64% / 96.46%
||
7 Day CHG~0.00%
Published-26 Feb, 2022 | 04:19
Updated-03 Aug, 2024 | 04:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On ICL ScadaFlex II SCADA Controller SC-1 and SC-2 1.03.07 devices, unauthenticated remote attackers can overwrite, delete, or create files.

Action-Not Available
Vendor-iclinksn/a
Product-scadaflex_ii_firmwarescadaflex_iiweblibn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-36852
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.1||CRITICAL
EPSS-0.10% / 27.37%
||
7 Day CHG~0.00%
Published-01 Oct, 2025 | 06:42
Updated-08 Apr, 2026 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Custom Searchable Data Entry System <= 1.7.1 - Unauthenticated Database Wiping

The Custom Searchable Data Entry System plugin for WordPress is vulnerable to unauthenticated database wiping in versions up to, and including 1.7.1, due to a missing capability check and lack of sufficient validation on the ghazale_sds_delete_entries_table_row() function. This makes it possible for unauthenticated attackers to completely wipe database tables such as wp_users.

Action-Not Available
Vendor-ghazale
Product-Custom Searchable Data Entry System
CWE ID-CWE-862
Missing Authorization
CVE-2024-54369
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-9.1||CRITICAL
EPSS-19.29% / 95.40%
||
7 Day CHG~0.00%
Published-16 Dec, 2024 | 14:31
Updated-28 Apr, 2026 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Zita Site Builder plugin <= 1.0.2 - Arbitrary Plugin Installation and Activation vulnerability

Missing Authorization vulnerability in ThemeHunk Zita Site Builder ai-site-builder allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Zita Site Builder: from n/a through <= 1.0.2.

Action-Not Available
Vendor-ThemeHunk
Product-Zita Site Builder
CWE ID-CWE-862
Missing Authorization
CVE-2021-42359
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-7.5||HIGH
EPSS-20.07% / 95.51%
||
7 Day CHG~0.00%
Published-05 Nov, 2021 | 19:44
Updated-14 Feb, 2025 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP DSGVO Tools (GDPR) <= 3.1.23 Unauthenticated Arbitrary Post Deletion

WP DSGVO Tools (GDPR) <= 3.1.23 had an AJAX action, ‘admin-dismiss-unsubscribe‘, which lacked a capability check and a nonce check and was available to unauthenticated users, and did not check the post type when deleting unsubscription requests. As such, it was possible for an attacker to permanently delete an arbitrary post or page on the site by sending an AJAX request with the “action” parameter set to “admin-dismiss-unsubscribe” and the “id” parameter set to the post to be deleted. Sending such a request would move the post to the trash, and repeating the request would permanently delete the post in question.

Action-Not Available
Vendor-legalweblegalweb
Product-wp_dsgvo_toolsWP DSGVO Tools (GDPR)
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-862
Missing Authorization
CVE-2020-36333
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-46.21% / 97.66%
||
7 Day CHG~0.00%
Published-05 May, 2021 | 03:12
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

themegrill-demo-importer before 1.6.2 does not require authentication for wiping the database, because of a reset_wizard_actions hook.

Action-Not Available
Vendor-themegrilln/a
Product-themegrill_demo_importern/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-41729
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.25% / 48.38%
||
7 Day CHG~0.00%
Published-30 Sep, 2021 | 10:43
Updated-04 Aug, 2024 | 03:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BaiCloud-cms v2.5.7 is affected by an arbitrary file deletion vulnerability, which allows an attacker to delete arbitrary files on the server through /user/ppsave.php.

Action-Not Available
Vendor-baicloud-cms_projectn/a
Product-baicloud-cmsn/a
CWE ID-CWE-862
Missing Authorization
CVE-2026-25939
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.02% / 6.13%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 22:21
Updated-13 Feb, 2026 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FUXA Unauthenticated Remote Arbitrary Scheduler Write

FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. From 1.2.8 through version 1.2.10, an authorization bypass vulnerability in the FUXA allows an unauthenticated, remote attacker to create and modify arbitrary schedulers, exposing connected ICS/SCADA environments to follow-on actions. This has been patched in FUXA version 1.2.11.

Action-Not Available
Vendor-frangoteamfrangoteam
Product-fuxaFUXA
CWE ID-CWE-862
Missing Authorization
CVE-2026-25752
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.02% / 5.52%
||
7 Day CHG~0.00%
Published-06 Feb, 2026 | 19:05
Updated-10 Feb, 2026 | 14:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FUXA Unauthenticated Remote Arbitrary Device Tag Write

FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An authorization bypass vulnerability in FUXA allows an unauthenticated, remote attacker to modify device tags via WebSockets. Exploitation allows an unauthenticated, remote attacker to bypass role-based access controls and overwrite arbitrary device tags or disable communication drivers, exposing connected ICS/SCADA environments to follow-on actions. This may allow an attacker to manipulate physical processes and disconnected devices from the HMI. This affects FUXA through version 1.2.9. This issue has been patched in FUXA version 1.2.10.

Action-Not Available
Vendor-frangoteamfrangoteam
Product-fuxaFUXA
CWE ID-CWE-862
Missing Authorization
CVE-2020-25366
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.55% / 68.01%
||
7 Day CHG~0.00%
Published-04 Nov, 2021 | 10:12
Updated-04 Aug, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in the component /cgi-bin/upload_firmware.cgi of D-Link DIR-823G REVA1 1.02B05 allows attackers to cause a denial of service (DoS) via unspecified vectors.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-823gdir-823g_firmwaren/a
CWE ID-CWE-862
Missing Authorization
CVE-2020-25359
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-1.42% / 80.68%
||
7 Day CHG~0.00%
Published-20 Aug, 2021 | 18:10
Updated-04 Aug, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An arbitrary file deletion vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability gave attackers the ability to send a crafted request to /lib/ajaxHandlers/ajaxDeleteAllLoggingFiles.php by specifying a path in the path parameter and an extension in the ext parameter and delete all the files with that extension in that path.

Action-Not Available
Vendor-rconfign/a
Product-rconfign/a
CWE ID-CWE-862
Missing Authorization
CVE-2024-45438
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.38% / 59.09%
||
7 Day CHG~0.00%
Published-21 Aug, 2025 | 00:00
Updated-03 Nov, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in TitanHQ SpamTitan Email Security Gateway 8.00.x before 8.00.101 and 8.01.x before 8.01.14. The file quarantine.php within the SpamTitan interface allows unauthenticated users to trigger account-level actions using a crafted GET request. Notably, when a non-existent email address is provided as part of the email parameter, SpamTitan will automatically create a user record and associate quarantine settings with it - all without requiring authentication.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-14741
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.1||CRITICAL
EPSS-0.05% / 14.07%
||
7 Day CHG~0.00%
Published-09 Jan, 2026 | 07:22
Updated-08 Apr, 2026 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Frontend Admin by DynamiApps <= 3.28.25 - Missing Authorization to Unauthenticated Arbitrary Data Deletion via 'delete post' Form Element

The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to missing authorization to unauthorized data modification and deletion due to a missing capability check on the 'delete_object' function in all versions up to, and including, 3.28.25. This makes it possible for unauthenticated attackers to delete arbitrary posts, pages, products, taxonomy terms, and user accounts.

Action-Not Available
Vendor-shabti
Product-Frontend Admin by DynamiApps
CWE ID-CWE-862
Missing Authorization
CVE-2023-4699
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-10||CRITICAL
EPSS-0.91% / 75.97%
||
7 Day CHG~0.00%
Published-06 Nov, 2023 | 05:02
Updated-16 Dec, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Command Execution Vulnerability in Mitsubishi Electric proprietary protocol communication of multiple FA products

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC-F Series CPU modules, MELSEC iQ-F Series, MELSEC iQ-R series CPU modules, MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series, MELSEC-L series, Mitsubishi Electric CNC M800V/M80V series, Mitsubishi Electric CNC M800/M80/E80 series and Mitsubishi Electric CNC M700V/M70V/E70 series allows a remote unauthenticated attacker to execute arbitrary commands by sending specific packets to the affected products. This could lead to disclose or tamper with information by reading or writing control programs, or cause a denial-of-service (DoS) condition on the products by resetting the memory contents of the products to factory settings or resetting the products remotely.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-fx3u-64mr\/ds_firmwarefx3uc-32mt-lt-2fx3u-128mt\/ess_firmwarefx3u-48mt\/es-a_firmwarefx5u-64mr\/dsfx3u-32ms\/esfx3g-14mt\/es-afx3s-10mr\/es_firmwarefx5uj-24mt\/es-a_firmwarefx3ge-24mt\/dsfx3u-64mr\/ua1fx3u-16mr\/es_firmwarefx5uc-64mt\/d_firmwarefx3u-80mt\/dsfx3ge-40mt\/dssfx3u-48mt\/dsfx3u-80mr\/es_firmwarefx5uj-24mr\/ds_firmwarefx3u-64mr\/es_firmwarefx3g-24mr\/es-a_firmwarefx3u-16mr\/es-afx3u-128mt\/es-afx5u-80mt\/dss_firmwarefx5u-32mt\/ess_firmwarefx3s-14mt\/esfx5u-32mt\/ds_firmwarefx3g-60mt\/es_firmwarefx5uj-40mr\/es-afx5uj-60mt\/dsfx3uc-96mt\/dfx5s-30mt\/ess_firmwarefx3s-30mt\/esfx3g-24mt\/ds_firmwarefx3ge-24mt\/ds_firmwarefx5u-64mt\/dss_firmwarefx5u-80mr\/dsfx5uc-32mt\/ds-ts_firmwarefx3uc-64mt\/dssfx3u-64mt\/esfx3g-24mt\/es-afx3ge-40mr\/dsfx5s-80mr\/es_firmwarefx3s-30mr\/es-2adfx5s-60mt\/ess_firmwarefx3g-24mt\/dss_firmwarefx5uj-24mt\/dss_firmwarefx3s-30mr\/ds_firmwarefx3u-16mt\/es_firmwarefx3sa-30mr-cm_firmwarefx3gc-32mt\/d_firmwarefx3ge-24mt\/dssfx3ga-24mr-cmfx3uc-96mt\/dss_firmwarefx5uc-32mt\/ds-tsfx3u-16mt\/dss_firmwarefx3g-14mr\/es-afx3sa-10mr-cmfx3g-60mt\/dssfx3s-14mt\/es_firmwarefx3g-40mt\/es-afx5uj-24mr\/es_firmwarefx5uj-24mr\/esfx3uc-32mt-lt_firmwarefx3ga-24mr-cm_firmwarefx5uj-24mt\/essfx5s-60mr\/esfx5uc-32mt\/dss_firmwarefx3uc-32mt\/dfx3uc-16mt\/dss-p4fx3sa-10mt-cmfx5s-60mt\/essfx5u-80mr\/esfx3g-40mt\/dsfx5u-80mt\/dssfx3g-60mr\/es-a_firmwarefx3s-20mt\/ds_firmwarefx3u-128mt\/es-a_firmwarefx3uc-32mt\/dss_firmwarefx3ge-24mt\/dss_firmwarefx3uc-16mt\/d_firmwarefx3g-40mt\/essfx5uj-24mr\/es-a_firmwarefx3u-16mr\/es-a_firmwarefx3g-14mt\/ess_firmwarefx3u-48mt\/dss_firmwarefx3s-20mt\/dssfx5uj-60mt\/esfx5uc-96mt\/dssfx3u-16mt\/ess_firmwarefx3g-40mt\/dssfx5uj-40mt\/dsfx3u-32mr\/es_firmwarefx3ge-24mr\/esfx3sa-14mr-cmfx3u-128mr\/es-afx3g-14mr\/es_firmwarefx5uj-60mr\/es-a_firmwarefx3ge-24mt\/es_firmwarefx3g-14mt\/dss_firmwarefx3ge-24mt\/ess_firmwarefx3u-64mt\/dsfx5u-80mt\/ess_firmwarefx3g-14mt\/ds_firmwarefx3u-80mt\/es-afx3gc-32mt\/dss_firmwarefx3u-48mr\/es_firmwarefx3g-40mr\/dsfx3uc-64mt\/dss_firmwarefx3u-128mr\/ds_firmwarefx3s-30mt\/es-2ad_firmwarefx3u-64mr\/es-afx3sa-20mt-cm_firmwarefx3s-10mr\/esfx3s-10mt\/ess_firmwarefx3u-80mt\/ds_firmwarefx5u-64mt\/dssfx5s-40mt\/esfx3s-20mr\/esfx3u-80mt\/dssfx3u-16mr\/esfx3g-60mt\/essfx5u-64mt\/dsfx3s-14mt\/dssfx3g-24mt\/essfx3ge-24mt\/essfx3s-14mr\/ds_firmwarefx5u-80mt\/dsfx5uc-96mt\/d_firmwarefx5uc-64mt\/dfx3ge-40mt\/dss_firmwarefx3g-60mr\/esfx3g-40mr\/es_firmwarefx5uj-40mt\/ess_firmwarefx3u-48mt\/dssfx3ge-40mt\/dsfx3ge-40mr\/ds_firmwarefx3g-24mt\/esfx3uc-16mr\/d-tfx3s-10mt\/dsfx5uj-24mt\/es-afx5u-32mt\/esfx3s-30mt\/ess-2adfx3g-60mr\/es_firmwarefx3ga-40mr-cmfx3sa-14mt-cmfx3u-128mt\/dsfx3u-32mt\/dsfx5uj-60mr\/ds_firmwarefx3u-64ms\/esfx3s-10mt\/esfx3ge-40mr\/esfx5uj-60mt\/dss_firmwarefx3s-10mt\/essfx5s-80mt\/es_firmwarefx3g-40mt\/esfx5u-32mt\/dsfx3u-64mr\/ua1_firmwarefx3u-64mt\/ds_firmwarefx3u-128mt\/dssfx3ge-40mt\/essfx3sa-20mr-cm_firmwarefx5s-80mt\/ess_firmwarefx3ge-24mr\/ds_firmwarefx3u-48mt\/ds_firmwarefx3uc-32mt-ltfx3u-32mt\/essfx3u-32mr\/ds_firmwarefx5uj-60mt\/es-a_firmwarefx5s-80mt\/essfx3g-24mt\/ess_firmwarefx3g-60mt\/dss_firmwarefx3sa-10mr-cm_firmwarefx3u-128mt\/essfx3u-16mt\/esfx3u-32mt\/es-a_firmwarefx5u-32mt\/es_firmwarefx3u-80mr\/es-a_firmwarefx3g-60mr\/ds_firmwarefx3s-20mt\/dsfx3ge-24mr\/dsfx3ga-60mt-cm_firmwarefx5uj-60mr\/es-afx3s-30mr\/es_firmwarefx5s-30mr\/es_firmwarefx3u-32mr\/dsfx3u-64mt\/es-a_firmwarefx3s-30mt\/ess-2ad_firmwarefx5s-40mr\/es_firmwarefx5s-40mt\/essfx3u-16mt\/ds_firmwarefx5u-80mr\/es_firmwarefx3ga-60mt-cmfx5uc-32mt\/d_firmwarefx3g-14mt\/esfx3sa-14mt-cm_firmwarefx3ge-40mt\/ess_firmwarefx3sa-14mr-cm_firmwarefx5uj-40mt\/dss_firmwarefx3s-10mr\/ds_firmwarefx3g-24mr\/es_firmwarefx3uc-16mr\/d-t_firmwarefx3g-14mt\/es_firmwarefx3s-14mt\/ess_firmwarefx3g-24mr\/dsfx5u-32mt\/essfx5uj-60mt\/ess_firmwarefx3u-64mt\/essfx3s-30mt\/dsfx3g-24mt\/es-a_firmwarefx5uc-32mr\/ds-tsfx3u-32mt\/ess_firmwarefx3g-60mt\/ess_firmwarefx3g-24mt\/dssfx5u-80mt\/es_firmwarefx3s-30mr\/es-2ad_firmwarefx5uj-40mr\/dsfx3u-48mt\/ess_firmwarefx5s-30mt\/esfx3u-64mt\/dss_firmwarefx3uc-64mt\/dfx3u-80mt\/dss_firmwarefx3g-14mt\/dssfx3g-14mr\/es-a_firmwarefx5s-40mt\/ess_firmwarefx3s-14mr\/esfx5uj-40mt\/es_firmwarefx3s-20mt\/ess_firmwarefx3uc-16mt\/d-p4_firmwarefx3sa-30mt-cmfx3uc-96mt\/d_firmwarefx5uj-24mt\/ess_firmwarefx5uj-24mt\/es_firmwarefx3g-40mt\/es_firmwarefx3g-60mr\/es-afx5u-80mt\/ds_firmwarefx3u-128mr\/es-a_firmwarefx5s-30mt\/essfx3u-64mt\/dssfx3g-14mr\/esfx5s-30mr\/esfx3s-20mr\/dsfx5u-32mr\/es_firmwarefx5uj-40mt\/es-afx3uc-16mt\/dssfx3ga-60mr-cm_firmwarefx3u-48mr\/ds_firmwarefx3s-10mt\/dssfx5s-40mr\/esfx5s-30mt\/es_firmwarefx3u-16mr\/dsfx3ga-40mt-cmfx5uj-40mr\/ds_firmwarefx3s-30mt\/dssfx3u-80mt\/esfx3s-14mr\/dsfx3u-80mt\/ess_firmwarefx3sa-30mr-cmfx5uj-24mt\/dsfx3g-24mr\/es-afx3u-32mr\/es-a_firmwarefx3u-128mr\/esfx3g-60mt\/esfx5uj-60mr\/es_firmwarefx3u-16mt\/dssfx5uj-24mt\/dssfx3u-32mr\/esfx3s-30mr\/esfx3u-64mt\/es_firmwarefx3g-40mt\/dss_firmwarefx5u-64mt\/ess_firmwarefx3u-16mt\/essfx3s-20mt\/essfx3u-128mt\/efx5uc-32mt\/dss-ts_firmwarefx3u-48mt\/essfx3uc-32mt\/d_firmwarefx3ga-60mr-cmfx3g-60mt\/es-afx3u-32mr\/ua1_firmwarefx3u-32mt\/es_firmwarefx3uc-16mt\/dfx3ga-24mt-cmfx3ge-40mt\/es_firmwarefx3g-24mr\/esfx5uj-40mr\/es_firmwarefx3g-60mt\/dsfx5uj-60mt\/es-afx3s-10mt\/ds_firmwarefx5u-64mt\/es_firmwarefx3u-32mt\/es-afx3ge-40mt\/ds_firmwarefx3s-10mt\/es_firmwarefx3gc-32mt\/dfx3u-32mr\/es-afx5uj-24mr\/dsfx5u-80mt\/essfx3u-64ms\/es_firmwarefx3s-30mt\/ds_firmwarefx5u-64mt\/essfx3u-32mt\/dss_firmwarefx3u-16mt\/dsfx5uj-24mr\/es-afx3g-60mr\/dsfx5u-64mr\/ds_firmwarefx5s-80mr\/esfx3s-20mr\/ds_firmwarefx3sa-20mt-cmfx3uc-16mr\/ds-t_firmwarefx3u-48mr\/es-a_firmwarefx3g-14mt\/dsfx5uc-64mt\/dssfx3u-32ms\/es_firmwarefx3g-40mr\/es-afx3ge-24mt\/esfx3s-14mt\/dss_firmwarefx5uj-60mr\/dsfx3g-14mt\/es-a_firmwarefx5uj-24mt\/ds_firmwarefx3sa-30mt-cm_firmwarefx3u-80mr\/esfx3g-40mt\/ess_firmwarefx3u-64mt\/ess_firmwarefx3u-80mt\/essfx5uj-60mt\/es_firmwarefx3uc-32mt\/dssfx3g-40mr\/es-a_firmwarefx3ge-40mt\/esfx3s-14mt\/dsfx5uc-64mt\/dss_firmwarefx5uj-40mt\/ds_firmwarefx5s-80mt\/esfx3u-48mr\/es-afx3s-30mt\/dss_firmwarefx3gc-32mt\/dssfx3s-10mr\/dsfx5u-64mt\/ds_firmwarefx3ge-40mr\/es_firmwarefx5uj-40mt\/essfx5uc-32mt\/dssfx3u-16mt\/es-afx3u-80mt\/es-a_firmwarefx3u-16mt\/es-a_firmwarefx3uc-16mt\/d-p4fx3u-128mt\/dss_firmwarefx3g-40mt\/ds_firmwarefx3ge-24mr\/es_firmwarefx3u-32mr\/ua1fx3g-14mr\/ds_firmwarefx3g-60mt\/es-a_firmwarefx3g-60mt\/ds_firmwarefx5uj-40mt\/es-a_firmwarefx5u-64mt\/esfx3u-48mt\/es_firmwarefx3uc-16mt\/dss-p4_firmwarefx3u-80mr\/es-afx3s-14mr\/es_firmwarefx5u-32mr\/esfx3g-14mr\/dsfx3ga-40mt-cm_firmwarefx3u-80mr\/ds_firmwarefx3u-48mt\/esfx5uj-60mt\/dssfx5uj-40mt\/dssfx3s-20mr\/es_firmwarefx5uj-60mr\/esfx3s-30mt\/ess_firmwarefx3u-32mt\/esfx3sa-20mr-cmfx3ga-24mt-cm_firmwarefx3sa-10mt-cm_firmwarefx3u-48mr\/dsfx3u-64mr\/dsfx3u-80mr\/dsfx5uc-32mt\/dss-tsfx5uj-40mt\/esfx3u-64mr\/es-a_firmwarefx3s-30mt\/essfx3g-40mr\/esfx5u-64mr\/esfx3u-48mt\/es-afx5uc-32mr\/ds-ts_firmwarefx3uc-32mt-lt-2_firmwarefx3u-32mt\/ds_firmwarefx3u-128mt\/ds_firmwarefx3g-24mr\/ds_firmwarefx3u-64mt\/es-afx3g-14mt\/essfx3s-20mt\/dss_firmwarefx3s-14mt\/essfx3g-24mt\/es_firmwarefx3uc-16mt\/dss_firmwarefx3g-24mt\/dsfx5u-32mr\/dsfx5uj-60mt\/ds_firmwarefx5s-60mr\/es_firmwarefx5u-80mt\/esfx3u-128mr\/es_firmwarefx3u-16mr\/ds_firmwarefx3s-20mt\/esfx5u-32mt\/dss_firmwarefx5uj-24mt\/esfx3uc-16mr\/ds-tfx3s-30mr\/dsfx5uj-40mr\/es-a_firmwarefx3u-128mr\/dsfx3s-14mt\/ds_firmwarefx5s-60mt\/es_firmwarefx3u-80mt\/es_firmwarefx5uj-40mr\/esfx3uc-64mt\/d_firmwarefx3uc-96mt\/dssfx3u-48mr\/esfx5s-60mt\/esfx3s-30mt\/es_firmwarefx5u-64mr\/es_firmwarefx3u-64mr\/esfx5uc-32mt\/dfx5u-32mr\/ds_firmwarefx3s-10mt\/dss_firmwarefx5uc-96mt\/dfx3s-20mt\/es_firmwarefx3u-32mt\/dssfx3s-30mt\/es-2adfx5uj-60mt\/essfx3g-40mt\/es-a_firmwarefx3ga-40mr-cm_firmwarefx5uc-96mt\/dss_firmwarefx5s-40mt\/es_firmwarefx5u-80mr\/ds_firmwarefx3g-40mr\/ds_firmwarefx3u-128mt\/e_firmwarefx5u-32mt\/dssMELSEC-F Series FX3G-14MT/ES-AMELSEC-F Series FX3S-20MT/ESSMELSEC-F Series FX3U-64MT/ESMELSEC-F Series FX3S-30MT/ESSMELSEC Q Series QD77GF8MELSEC-F Series FX3U-128MT/DSSMELSEC iQ-R Series R120PCPUMELSEC-F Series FX3UC-96MT/DMELSEC-F Series FX3U-32MT/ES-AMELSEC-F Series FX3U-32MT/ESSMELSEC-F Series FX3GE-40MR/DSMitsubishi Electric CNC M700V Series M720VWMELSEC-F Series FX3U-64MR/UA1MELSEC-F Series FX3U-32MR/ES-AMELSEC iQ-F Series FX5UJ-60MR/DSMELSEC iQ-F Series FX5U-64MT/ESSMELSEC iQ-F Series FX5UJ-24MT/DSMELSEC-F Series FX3U-128MR/ESMELSEC iQ-F Series FX5U-80MT/DSSMELSEC iQ-L Series LD78G16MELSEC-F Series FX3U-16MT/ESMELSEC-F Series FX3U-64MR/DSMELSEC-F Series FX3G-60MT/DSSMELSEC iQ-R Series R08PCPUMELSEC-F Series FX3S-10MR/DSMELSEC-F Series FX3U-128MT/DSMELSEC iQ-R Series R16MTCPUMELSEC-F Series FX3GE-24MT/ESMELSEC iQ-F Series FX5S-60MT/ESSMELSEC-F Series FX3GE-40MR/ESMELSEC-F Series FX3UC-16MR/D-TMELSEC-F Series FX3S-20MR/DSMELSEC iQ-R Series R120ENCPUMELSEC iQ-F Series FX5U-32MR/ESMELSEC-F Series FX3U-80MT/DSMELSEC-F Series FX3UC-32MT/DMELSEC-F Series FX3G-24MT/DSMELSEC iQ-F Series FX5S-80MR/ESMELSEC iQ-F Series FX5-80SSC-SMELSEC-F Series FX3U-80MR/ESMELSEC iQ-R Series R64MTCPUMELSEC iQ-F Series FX5U-32MT/ESMELSEC iQ-F Series FX5S-80MT/ESMELSEC iQ-F Series FX5UJ-24MT/DSSMELSEC-F Series FX3G-60MT/ES-AMELSEC-F Series FX3GE-24MT/DSMELSEC iQ-R Series R16PCPUMELSEC-F Series FX3S-30MR/DSMELSEC iQ-F Series FX5UJ-60MT/ES-AMELSEC iQ-F Series FX5U-64MR/DSMELSEC iQ-F Series FX5U-80MR/DSMELSEC-F Series FX3G-14MT/ESSMELSEC-F Series FX3UC-16MT/DSS-P4MELSEC iQ-R Series R04CPUMELSEC-F Series FX3S-14MR/ESMELSEC iQ-F Series FX5UC-32MR/DS-TSMELSEC iQ-F Series FX5UJ-60MT/ESMELSEC iQ-R Series RD77MS8MELSEC iQ-R Series RD77MS4MELSEC iQ-F Series FX5S-40MT/ESSMELSEC iQ-F Series FX5UJ-24MT/ESMELSEC iQ-F Series FX5UJ-60MT/ESSMELSEC iQ-R Series R16ENCPUMELSEC-F Series FX3G-14MR/ESMELSEC-F Series FX3S-10MR/ESMELSEC-F Series FX3U-48MT/DSSMELSEC iQ-F Series FX5UJ-40MT/DSMELSEC iQ-R Series R16CPUMELSEC-F Series FX3U-16MT/ESSMELSEC L Series LD77MS16MELSEC-F Series FX3G-40MR/ESMELSEC-F Series FX3U-16MR/ESMELSEC iQ-F Series FX5UJ-24MR/ESMELSEC iQ-F Series FX5S-60MT/ESMELSEC-F Series FX3S-14MR/DSMELSEC-F Series FX3GE-24MT/DSSMELSEC-F Series FX3U-32MT/ESMELSEC iQ-F Series FX5U-64MT/DSSMELSEC-F Series FX3U-16MR/DSMELSEC-F Series FX3S-20MT/ESMELSEC-F Series FX3U-64MS/ESMELSEC iQ-R Series RD78G8MELSEC-F Series FX3S-30MT/ESS-2ADMELSEC-F Series FX3GA-24MT-CMMELSEC iQ-R Series R04ENCPUMELSEC iQ-R Series RD77MS16MELSEC iQ-F Series FX5U-80MT/DSMELSEC-F Series FX3U-128MT/ESSMitsubishi Electric CNC M80V Series M80VMELSEC-F Series FX3U-48MR/ESMELSEC iQ-F Series FX5-40SSC-SMELSEC iQ-F Series FX5S-30MT/ESSMELSEC-F Series FX3SA-20MT-CMMELSEC iQ-F Series FX5UC-64MT/DSSMELSEC-F Series FX3U-128MR/DSMELSEC iQ-F Series FX5UC-32MT/DSS-TSMELSEC-F Series FX3U-32MT/DSSMELSEC iQ-F Series FX5UJ-40MT/ES-AMELSEC-F Series FX3U-16MT/ES-AMELSEC iQ-F Series FX5UJ-24MR/DSMELSEC-F Series FX3UC-32MT/DSSMELSEC iQ-F Series FX5UC-96MT/DSSMitsubishi Electric CNC M700V Series M720VSMELSEC-F Series FX3U-64MT/DSSMELSEC-F Series FX3G-24MT/ESMELSEC-F Series FX3G-60MT/ESSMitsubishi Electric CNC E80 Series E80MELSEC iQ-F Series FX5UC-64MT/DMELSEC iQ-R Series RD78G4MELSEC-F Series FX3SA-20MR-CMMELSEC-F Series FX3GE-24MR/DSMELSEC-F Series FX3GA-60MT-CMMELSEC-F Series FX3U-64MR/ES-AMELSEC iQ-F Series FX5U-64MR/ESMitsubishi Electric CNC M80 Series M80WMELSEC-F Series FX3GA-24MR-CMMELSEC iQ-F Series FX5S-80MT/ESSMELSEC-F Series FX3S-14MT/DSSMELSEC-F Series FX3S-30MT/DSMELSEC-F Series FX3UC-32MT-LTMELSEC-F Series FX3G-40MT/ESMELSEC-F Series FX3S-20MR/ESMitsubishi Electric CNC M80 Series M80Mitsubishi Electric CNC M70V Series M70VMELSEC iQ-F Series FX5UC-32MT/DS-TSMELSEC-F Series FX3G-24MR/ES-AMELSEC-F Series FX3U-80MR/ES-AMELSEC-F Series FX3GA-60MR-CMMELSEC-F Series FX3U-80MT/ESSMELSEC-F Series FX3G-24MT/ES-AMELSEC-F Series FX3G-40MT/ESSMELSEC-F Series FX3G-60MT/ESMELSEC-F Series FX3G-40MR/DSMELSEC L Series LD77MS4MELSEC-F Series FX3S-14MT/ESSMELSEC-F Series FX3GE-40MT/DSSMELSEC iQ-F Series FX5S-30MT/ESMELSEC-F Series FX3GA-40MT-CMMELSEC-F Series FX3U-32MR/DSMELSEC-F Series FX3GE-40MT/ESMELSEC iQ-R Series RD78G32MELSEC iQ-L Series LD78G4MELSEC-F Series FX3U-128MR/ES-AMELSEC iQ-F Series FX5UC-96MT/DMELSEC-F Series FX3G-40MT/DSMELSEC iQ-F Series FX5U-64MT/DSMELSEC iQ-F Series FX5U-80MT/ESMELSEC Q Series QD77MS2MELSEC-F Series FX3G-60MR/DSMELSEC-F Series FX3U-32MR/UA1MELSEC-F Series FX3GE-24MT/ESSMELSEC-F Series FX3GA-40MR-CMMELSEC iQ-R Series RD78G64MELSEC-F Series FX3GE-40MT/DSMELSEC-F Series FX3UC-16MT/DMELSEC-F Series FX3U-128MT/ESMELSEC-F Series FX3U-16MT/DSMitsubishi Electric CNC M800 Series M800WMELSEC-F Series FX3UC-16MR/DS-TMitsubishi Electric CNC M700V Series M750VWMELSEC-F Series FX3GC-32MT/DMELSEC iQ-F Series FX5UC-32MT/DMELSEC-F Series FX3U-80MT/ESMELSEC-F Series FX3UC-32MT-LT-2MELSEC-F Series FX3U-48MR/DSMELSEC iQ-F Series FX5U-32MR/DSMELSEC iQ-F Series FX5S-60MR/ESMELSEC iQ-F Series FX5U-32MT/ESSMELSEC iQ-F Series FX5U-32MT/DSSMitsubishi Electric CNC M700V Series M730VSMELSEC-F Series FX3G-14MR/ES-AMELSEC iQ-F Series FX5-40SSC-GMELSEC Q Series Q172DSCPUMELSEC iQ-F Series FX5S-30MR/ESMitsubishi Electric CNC M80V Series M80VWMELSEC-F Series FX3U-48MT/ESSMELSEC iQ-R Series RD78GHVMELSEC-F Series FX3S-10MT/ESMELSEC iQ-F Series FX5UJ-40MR/ES-AMELSEC-F Series FX3S-10MT/DSSMitsubishi Electric CNC M700V Series M750VSMELSEC-F Series FX3G-14MT/DSMELSEC-F Series FX3SA-14MT-CMMELSEC iQ-R Series RD77GF16MELSEC-F Series FX3U-80MR/DSMELSEC iQ-R Series R32PCPUMELSEC-F Series FX3S-20MT/DSSMELSEC Q Series QD77GF4Mitsubishi Electric CNC M800 Series M800SMELSEC iQ-F Series FX5UJ-40MT/ESMELSEC iQ-F Series FX5UJ-60MT/DSMELSEC-F Series FX3G-24MR/ESMELSEC iQ-F Series FX5U-80MR/ESMELSEC iQ-F Series FX5UJ-40MT/ESSMitsubishi Electric CNC M800V Series M800VSMELSEC iQ-F Series FX5UJ-40MR/ESMELSEC iQ-F Series FX5UJ-60MR/ES-AMELSEC Q Series QD77GF16MELSEC iQ-R Series RD77MS2MELSEC-F Series FX3GC-32MT/DSSMELSEC-F Series FX3U-64MR/ESMELSEC-F Series FX3G-14MT/ESMELSEC-F Series FX3GE-24MR/ESMELSEC-F Series FX3S-20MT/DSMELSEC-F Series FX3SA-10MR-CMMELSEC iQ-R Series RD78G16MELSEC-F Series FX3U-64MT/DSMELSEC-F Series FX3U-128MT/ES-AMELSEC-F Series FX3SA-10MT-CMMELSEC-F Series FX3G-40MR/ES-AMELSEC-F Series FX3U-64MT/ES-AMELSEC iQ-R Series RD78GHWMELSEC iQ-F Series FX5U-80MT/ESSMELSEC iQ-F Series FX5UJ-60MR/ESMELSEC-F Series FX3G-24MT/ESSMELSEC iQ-F Series FX5UJ-60MT/DSSMELSEC-F Series FX3S-30MT/DSSMELSEC iQ-R Series R32MTCPUMELSEC iQ-R Series RD77GF8MELSEC L Series LD77MS2MELSEC-F Series FX3U-48MT/ESMELSEC-F Series FX3U-32MS/ESMELSEC iQ-F Series FX5U-32MT/DSMELSEC-F Series FX3G-24MT/DSSMELSEC iQ-R Series R32CPUMELSEC iQ-F Series FX5S-40MR/ESMitsubishi Electric CNC M800V Series M800VWMELSEC-F Series FX3U-48MT/ES-AMELSEC-F Series FX3UC-16MT/D-P4MELSEC iQ-R Series RD77GF4MELSEC iQ-F Series FX5U-64MT/ESMELSEC iQ-R Series R08CPUMELSEC-F Series FX3SA-30MT-CMMELSEC iQ-F Series FX5UC-32MT/DSSMELSEC-F Series FX3S-14MT/ESMELSEC-F Series FX3G-14MR/DSMELSEC-F Series FX3S-10MT/DSMELSEC Q Series Q173DSCPUMELSEC iQ-F Series FX5S-40MT/ESMELSEC-F Series FX3UC-96MT/DSSMELSEC-F Series FX3SA-30MR-CMMELSEC-F Series FX3U-32MR/ESMELSEC-F Series FX3S-30MR/ES-2ADMELSEC-F Series FX3SA-14MR-CMMELSEC-F Series FX3G-60MR/ES-AMELSEC-F Series FX3U-48MR/ES-AMitsubishi Electric CNC M700V Series M730VWMELSEC iQ-F Series FX5-80SSC-GMELSEC iQ-F Series FX5UJ-24MT/ES-AMELSEC iQ-F Series FX5UJ-24MT/ESSMELSEC-F Series FX3U-80MT/DSSMELSEC-F Series FX3UC-64MT/DSSMELSEC-F Series FX3S-30MT/ESMELSEC-F Series FX3U-48MT/DSMELSEC iQ-F Series FX5UJ-40MT/DSSMELSEC iQ-R Series R120CPUMELSEC-F Series FX3UC-16MT/DSSMELSEC-F Series FX3G-40MT/ES-AMELSEC-F Series FX3G-60MT/DSMELSEC-F Series FX3U-16MR/ES-AMELSEC-F Series FX3S-10MT/ESSMELSEC-F Series FX3U-80MT/ES-AMELSEC-F Series FX3S-30MR/ESMELSEC-F Series FX3S-30MT/ES-2ADMitsubishi Electric CNC E70 Series E70MELSEC iQ-F Series FX5UJ-40MR/DSMELSEC-F Series FX3G-24MR/DSMELSEC-F Series FX3U-64MT/ESSMELSEC-F Series FX3U-32MT/DSMELSEC-F Series FX3G-14MT/DSSMELSEC-F Series FX3G-40MT/DSSMELSEC iQ-R Series RD77GF32MELSEC-F Series FX3UC-64MT/DMELSEC iQ-R Series R32ENCPUMELSEC-F Series FX3U-16MT/DSSMELSEC-F Series FX3S-14MT/DSMELSEC Q Series Q170MSCPUMELSEC-F Series FX3G-60MR/ESMELSEC Q Series QD77MS16MELSEC iQ-R Series R08ENCPUMELSEC-F Series FX3GE-40MT/ESSMELSEC Q Series QD77MS4MELSEC iQ-F Series FX5UJ-24MR/ES-A
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-19038
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.25% / 48.38%
||
7 Day CHG~0.00%
Published-12 Jul, 2021 | 16:45
Updated-04 Aug, 2024 | 14:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

File Deletion vulnerability in Halo 0.4.3 via delBackup.

Action-Not Available
Vendor-n/aHalo (FIT2CLOUD Inc.)
Product-halon/a
CWE ID-CWE-862
Missing Authorization
CVE-2022-29951
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.34% / 56.75%
||
7 Day CHG~0.00%
Published-26 Jul, 2022 | 21:04
Updated-27 Oct, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JTEKT TOYOPUC PLCs through 2022-04-29 mishandle authentication. They utilize the CMPLink/TCP protocol (configurable on ports 1024-65534 on either TCP or UDP) for a wide variety of engineering purposes such as starting and stopping the PLC, downloading and uploading projects, and changing configuration settings. This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.

Action-Not Available
Vendor-jtektn/ajtekt
Product-plus_cpu_tcc-6740pc3jx-d_tcc-6902_firmwarepc10pe-1616p_tcc-1102_firmwarepc10p_tcc-6372_firmwarepc10b_tcc-1021pc3jx-d_tcc-6902pcdl_tkc-6688pc10ge_tcc-6464_firmwarepcdl_tkc-6688_firmwarepc10p_tcc-6372pc10b-p_tcc-6373pc10b_tcc-1021_firmwarepc10p-dp_tcc-6726_firmwarepc10g-cpu_tcc-6353plus_cpu_tcc-6740_firmwarepc10p-dp_tcc-6726pc10el_tcc-4747_firmwarepc10p-dp-io_tcc-6752_firmwarepc3jx_tcc-6901pc3jx_tcc-6901_firmwarepc10pe_tcc-1101_firmwarepc10pe_tcc-1101pc10e_tcc-4737_firmwarepc10e_tcc-4737nano_10gx_tuc-1157nano_cpu_tuc-6941_firmwarepc10p-dp-io_tcc-6752pc10g-cpu_tcc-6353_firmwarepc10ge_tcc-6464pc10pe-1616p_tcc-1102pc10b-p_tcc-6373_firmwarepc10el_tcc-4747nano_10gx_tuc-1157_firmwarenano_cpu_tuc-6941n/apc10g-cpu_tcc-6353_firmware
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-12505
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-8.2||HIGH
EPSS-0.27% / 50.28%
||
7 Day CHG~0.00%
Published-30 Sep, 2020 | 15:43
Updated-16 Sep, 2024 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WAGO: Vulnerability in web-based authentication in WAGO 750-8XX Version <= FW07

Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attacker to change some special parameters without authentication. This issue affects: WAGO 750-852, WAGO 750-880/xxx-xxx, WAGO 750-881, WAGO 750-831/xxx-xxx, WAGO 750-882, WAGO 750-885/xxx-xxx, WAGO 750-889 in versions FW07 and below.

Action-Not Available
Vendor-wagoWAGO
Product-750-882_firmware750-881_firmware750-880_firmware750-889_firmware750-889750-882750-885_firmware750-831750-885750-852_firmware750-852750-881750-831_firmware750-880750-831/xxx-xxx750-889750-880/xxx-xxx750-882750-885/xxx-xxx750-852750-881
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-12506
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-9.1||CRITICAL
EPSS-0.27% / 50.28%
||
7 Day CHG~0.00%
Published-30 Sep, 2020 | 15:43
Updated-17 Sep, 2024 | 00:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WAGO: Authentication Bypass Vulnerability in WAGO 750-36X and WAGO 750-8XX Versions <= FW03

Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362, WAGO 750-363, WAGO 750-823, WAGO 750-832/xxx-xxx, WAGO 750-862, WAGO 750-891, WAGO 750-890/xxx-xxx in versions FW03 and prior versions.

Action-Not Available
Vendor-wagoWAGO
Product-750-890_firmware750-362_firmware750-890750-832750-363_firmware750-363750-862_firmware750-891_firmware750-823750-862750-891750-362750-832_firmware750-823_firmware750-890/xxx-xxx750-832/xxx-xxx750-363750-823750-891750-862750-362
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-10612
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.1||CRITICAL
EPSS-0.22% / 43.90%
||
7 Day CHG~0.00%
Published-14 May, 2020 | 20:33
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Opto 22 SoftPAC Project Version 9.6 and prior. SoftPACAgent communicates with SoftPACMonitor over network Port 22000. However, this port is open without any restrictions. This allows an attacker with network access to control the SoftPACAgent service including updating SoftPAC firmware, starting or stopping service, or writing to certain registry values.

Action-Not Available
Vendor-opto22n/a
Product-softpac_projectOpto 22 SoftPAC Project
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-862
Missing Authorization
CVE-2023-34335
Matching Score-4
Assigner-AMI
ShareView Details
Matching Score-4
Assigner-AMI
CVSS Score-7.7||HIGH
EPSS-0.04% / 13.55%
||
7 Day CHG~0.00%
Published-12 Jun, 2023 | 17:06
Updated-03 Jan, 2025 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AMI BMC contains a vulnerability in the IPMI handler, where an unauthenticated host is allowed to write to a host SPI flash, bypassing secure boot protections. An exploitation of this vulnerability may lead to a loss of integrity or denial of service.  

Action-Not Available
Vendor-AMI
Product-megarac_spxMegaRAC_SPx
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-68715
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.62% / 70.22%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 00:00
Updated-30 Jan, 2026 | 01:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Panda Wireless PWRU0 devices with firmware 2.2.9 that exposes multiple HTTP endpoints (/goform/setWan, /goform/setLan, /goform/wirelessBasic) that do not enforce authentication. A remote unauthenticated attacker can modify WAN, LAN, and wireless settings directly, leading to privilege escalation and denial of service.

Action-Not Available
Vendor-pandawirelessn/a
Product-pwru01_firmwarepwru01n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-53810
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-9.1||CRITICAL
EPSS-0.25% / 47.91%
||
7 Day CHG~0.00%
Published-06 Dec, 2024 | 13:07
Updated-28 Apr, 2026 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Simple User Registration plugin <= 5.5 - Broken Access Control on User Deletion vulnerability

Missing Authorization vulnerability in N-Media Simple User Registration wp-registration allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Simple User Registration: from n/a through <= 5.5.

Action-Not Available
Vendor-N-Median-media
Product-Simple User Registrationsimple_user_registration
CWE ID-CWE-862
Missing Authorization
CVE-2025-59345
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.7||HIGH
EPSS-0.06% / 17.35%
||
7 Day CHG~0.00%
Published-17 Sep, 2025 | 19:05
Updated-13 Oct, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dragonfly did not enable authentication for some Manager’s endpoints

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, The /api/v1/jobs and /preheats endpoints in Manager web UI are accessible without authentication. Any user with network access to the Manager can create, delete, and modify jobs, and create preheat jobs. An unauthenticated adversary with network access to a Manager web UI uses /api/v1/jobs endpoint to create hundreds of useless jobs. The Manager is in a denial-of-service state, and stops accepting requests from valid administrators. This vulnerability is fixed in 2.1.0.

Action-Not Available
Vendor-dragonflyossThe Linux Foundation
Product-dragonflydragonfly
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-5080
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.1||CRITICAL
EPSS-0.42% / 61.94%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 20:35
Updated-04 Aug, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable denial-of-service vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A single packet can cause a denial of service and weaken credentials resulting in the default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability.

Action-Not Available
Vendor-wagon/a
Product-pfc_100_firmwarepfc_200_firmwarepfc_200pfc_100WAGO PFC200WAGO PFC100
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-33565
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-9.1||CRITICAL
EPSS-0.26% / 49.18%
||
7 Day CHG~0.00%
Published-09 Jun, 2024 | 12:01
Updated-28 Apr, 2026 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Barcode Scanner with Inventory & Order Manager plugin <= 1.5.3 - Unauthenticated Broken Access Control vulnerability

Missing Authorization vulnerability in UkrSolution Barcode Scanner with Inventory & Order Manager.This issue affects Barcode Scanner with Inventory & Order Manager: from n/a through 1.5.3.

Action-Not Available
Vendor-ukrsolutionUkrSolutionukrsolution
Product-barcode_scanner_and_inventory_managerBarcode Scanner with Inventory & Order Managerbarcode_scanner_and_inventory_manager
CWE ID-CWE-862
Missing Authorization
CVE-2024-32752
Matching Score-4
Assigner-Johnson Controls
ShareView Details
Matching Score-4
Assigner-Johnson Controls
CVSS Score-8.8||HIGH
EPSS-0.21% / 43.41%
||
7 Day CHG~0.00%
Published-06 Jun, 2024 | 20:49
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Johnson Controls Software House iSTAR Configuration Utility (ICU) Tool

The iSTAR door controllers running firmware prior to version 6.6.B, does not support authenticated communications with ICU, which may allow an attacker to gain unauthorized access

Action-Not Available
Vendor-Johnson Controlsjohnsoncontrols
Product-iSTAR Configuration Utility (ICU)iSTAR Ultra and Ultra LTiSTAR Pro, Edge and eXicusoftware_house_istar_pro_door_controller
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-32948
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-9.1||CRITICAL
EPSS-0.14% / 34.11%
||
7 Day CHG~0.00%
Published-24 Apr, 2024 | 07:03
Updated-28 Apr, 2026 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress ARMember – Membership Plugin plugin <= 4.0.28 - Broken Access Control vulnerability

Missing Authorization vulnerability in Repute Infosystems ARMember.This issue affects ARMember: from n/a through 4.0.28.

Action-Not Available
Vendor-reputeinfosystemsRepute Infosystemsarmemberplugin
Product-armemberARMemberarmember
CWE ID-CWE-862
Missing Authorization
CVE-2024-24822
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.00% / 0.07%
||
7 Day CHG~0.00%
Published-07 Feb, 2024 | 17:17
Updated-07 Nov, 2024 | 20:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pimcore Admin Classic Bundle permissions are not getting checked when working with tags

Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. Prior to version 1.3.3, an attacker can create, delete etc. tags without having the permission to do so. A fix is available in version 1.3.3. As a workaround, one may apply the patch manually.

Action-Not Available
Vendor-Pimcore
Product-admin_classic_bundleadmin-ui-classic-bundle
CWE ID-CWE-862
Missing Authorization
CVE-2025-34434
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.27% / 50.13%
||
7 Day CHG~0.00%
Published-17 Dec, 2025 | 19:49
Updated-19 Dec, 2025 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AVideo < 20.1 ImageGallery Plugin Unauthenticated File Upload and Deletion

AVideo versions prior to 20.1 with the ImageGallery plugin enabled is vulnerable to unauthenticated file upload and deletion. Plugin endpoints responsible for managing gallery images fail to enforce authentication checks and do not validate ownership, allowing unauthenticated attackers to upload or delete images associated with any image-based video.

Action-Not Available
Vendor-wwbnWorld Wide Broadcast Network
Product-avideoAVideo
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-22804
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.1||CRITICAL
EPSS-0.26% / 49.21%
||
7 Day CHG~0.00%
Published-15 Feb, 2023 | 17:25
Updated-16 Jan, 2025 | 21:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-22804

LS ELECTRIC XBC-DN32U with operating system version 01.80 is missing authentication to create users on the PLC. This could allow an attacker to create and use an account with elevated privileges and take control of the device.

Action-Not Available
Vendor-LS ELECTRIC Co. Ltd.
Product-xbc-dn32uxbc-dn32u_firmwareXBC-DN32U
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-26957
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.23% / 45.72%
||
7 Day CHG~0.00%
Published-09 Mar, 2023 | 00:00
Updated-05 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

onekeyadmin v1.3.9 was discovered to contain an arbitrary file delete vulnerability via the component \admin\controller\plugins.

Action-Not Available
Vendor-onekeyadminn/a
Product-onekeyadminn/a
CWE ID-CWE-862
Missing Authorization
CVE-2024-11069
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.35% / 57.08%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 07:35
Updated-08 Apr, 2026 | 17:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress GDPR <= 2.0.2 - Missing Authorization to Unauthenticated Arbitrary User Deletion

The WordPress GDPR plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'WordPress_GDPR_Data_Delete::check_action' function in all versions up to, and including, 2.0.2. This makes it possible for unauthenticated attackers to delete arbitrary users.

Action-Not Available
Vendor-welaunchwelaunchwelaunch
Product-wordpress_gdprWordPress GDPRwordpress_gdpr\&ccpa
CWE ID-CWE-862
Missing Authorization
CVE-2023-0102
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.1||CRITICAL
EPSS-0.18% / 39.77%
||
7 Day CHG~0.00%
Published-15 Feb, 2023 | 17:20
Updated-16 Jan, 2025 | 21:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-0102

LS ELECTRIC XBC-DN32U with operating system version 01.80 is missing authentication for its deletion command. This could allow an attacker to delete arbitrary files.

Action-Not Available
Vendor-LS ELECTRIC Co. Ltd.
Product-xbc-dn32uxbc-dn32u_firmwareXBC-DN32U
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-0291
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-7.2||HIGH
EPSS-0.09% / 25.56%
||
7 Day CHG~0.00%
Published-09 Jun, 2023 | 05:33
Updated-08 Apr, 2026 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Quiz And Survey Master <= 8.0.8 - Unauthenticated Arbitrary Media Deletion

The Quiz And Survey Master for WordPress is vulnerable to authorization bypass due to a missing capability check on the function associated with the qsm_remove_file_fd_question AJAX action in versions up to, and including, 8.0.8. This makes it possible for unauthenticated attackers to delete arbitrary media files.

Action-Not Available
Vendor-expresstechexpresstech
Product-quiz_and_survey_masterQuiz and Survey Master (QSM) – Easy Quiz and Survey Maker
CWE ID-CWE-862
Missing Authorization
CVE-2019-5078
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.1||CRITICAL
EPSS-0.66% / 71.25%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 20:51
Updated-04 Aug, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable denial of service vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a denial of service, resulting in the device entering an error state where it ceases all network communications. An attacker can send unauthenticated packets to trigger this vulnerability.

Action-Not Available
Vendor-wagon/a
Product-pfc_100_firmwarepfc_200_firmwarepfc_200pfc_100WAGO PFC200WAGO PFC100
CWE ID-CWE-306
Missing Authentication for Critical Function
  • Previous
  • 1
  • 2
  • Next
Details not found