Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-4370

Summary
Assigner-canonical
Assigner Org ID-cc1ad9ee-3454-478d-9317-d3e869d708bc
Published At-01 Apr, 2026 | 08:09
Updated At-08 Apr, 2026 | 07:27
Rejected At-
Credits

Improper TLS Client/Server authentication and certificate verification on Database Cluster

A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from version 4.0 until 4.0.4, where the internal Dqlite database cluster fails to perform proper TLS client and server authentication. Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. An unauthenticated attacker with network reachability to the Juju controller's Dqlite port can exploit this flaw to join the database cluster. Once joined, the attacker gains full read and write access to the underlying database, allowing for total data compromise.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:canonical
Assigner Org ID:cc1ad9ee-3454-478d-9317-d3e869d708bc
Published At:01 Apr, 2026 | 08:09
Updated At:08 Apr, 2026 | 07:27
Rejected At:
â–¼CVE Numbering Authority (CNA)
Improper TLS Client/Server authentication and certificate verification on Database Cluster

A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from version 4.0 until 4.0.4, where the internal Dqlite database cluster fails to perform proper TLS client and server authentication. Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. An unauthenticated attacker with network reachability to the Juju controller's Dqlite port can exploit this flaw to join the database cluster. Once joined, the attacker gains full read and write access to the underlying database, allowing for total data compromise.

Affected Products
Vendor
Canonical Ltd.Canonical
Product
Juju
Collection URL
https://github.com/juju/
Package Name
juju
Repo
https://github.com/juju/juju
Platforms
  • Linux
Default Status
unaffected
Versions
Affected
  • From 3.2.0 before 3.6.20 (semver)
  • From 4.0 before 4.0.4 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-295CWE-295 Improper certificate validation
CWECWE-306CWE-306 Missing authentication for critical function
Type: CWE
CWE ID: CWE-295
Description: CWE-295 Improper certificate validation
Type: CWE
CWE ID: CWE-306
Description: CWE-306 Missing authentication for critical function
Metrics
VersionBase scoreBase severityVector
3.110.0CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 10.0
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-115CAPEC-115 Authentication Bypass
CAPEC-94CAPEC-94 Adversary in the Middle (AiTM)
CAPEC ID: CAPEC-115
Description: CAPEC-115 Authentication Bypass
CAPEC ID: CAPEC-94
Description: CAPEC-94 Adversary in the Middle (AiTM)
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Harry Pidcock
analyst
Thomas Miller
remediation developer
Joseph Phillips
coordinator
Ian Booth
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/juju/juju/security/advisories/GHSA-gvrj-cjch-728p
N/A
Hyperlink: https://github.com/juju/juju/security/advisories/GHSA-gvrj-cjch-728p
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@ubuntu.com
Published At:01 Apr, 2026 | 09:16
Updated At:02 Apr, 2026 | 20:24

A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from version 4.0 until 4.0.4, where the internal Dqlite database cluster fails to perform proper TLS client and server authentication. Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. An unauthenticated attacker with network reachability to the Juju controller's Dqlite port can exploit this flaw to join the database cluster. Once joined, the attacker gains full read and write access to the underlying database, allowing for total data compromise.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.110.0CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 10.0
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CPE Matches

Canonical Ltd.
canonical
>>juju>>Versions from 3.2.0(inclusive) to 3.6.20(exclusive)
cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>juju>>Versions from 4.0(inclusive) to 4.0.5(exclusive)
cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-295Secondarysecurity@ubuntu.com
CWE-306Secondarysecurity@ubuntu.com
CWE-295Primarynvd@nist.gov
CWE ID: CWE-295
Type: Secondary
Source: security@ubuntu.com
CWE ID: CWE-306
Type: Secondary
Source: security@ubuntu.com
CWE ID: CWE-295
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/juju/juju/security/advisories/GHSA-gvrj-cjch-728psecurity@ubuntu.com
Exploit
Vendor Advisory
Hyperlink: https://github.com/juju/juju/security/advisories/GHSA-gvrj-cjch-728p
Source: security@ubuntu.com
Resource:
Exploit
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

67Records found

CVE-2022-24760
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-10||CRITICAL
EPSS-75.56% / 98.91%
||
7 Day CHG~0.00%
Published-11 Mar, 2022 | 23:55
Updated-22 Apr, 2025 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Injection in Parse server

Parse Server is an open source http web server backend. In versions prior to 4.10.7 there is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability has been confirmed on Linux (Ubuntu) and Windows. Users are advised to upgrade as soon as possible. The only known workaround is to manually patch your installation with code referenced at the source GHSA-p6h4-93qp-jhcm.

Action-Not Available
Vendor-parseplatformparse-communityMicrosoft CorporationCanonical Ltd.
Product-ubuntu_linuxparse-serverwindowsparse-server
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CVE-2020-13753
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||CRITICAL
EPSS-1.22% / 79.12%
||
7 Day CHG~0.00%
Published-14 Jul, 2020 | 13:07
Updated-04 Aug, 2024 | 12:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.

Action-Not Available
Vendor-wpewebkitwebkitgtkn/aCanonical Ltd.openSUSEFedora ProjectDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxfedorawebkitgtkwpe_webkitleapn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2020-1472
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-94.38% / 99.97%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 19:13
Updated-23 Feb, 2026 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-03||Apply updates per vendor instructions.
Netlogon Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.

Action-Not Available
Vendor-Canonical Ltd.openSUSEOracle CorporationSambaSynology, Inc.Microsoft CorporationDebian GNU/LinuxFedora Project
Product-windows_server_2016windows_server_2004directory_serverzfs_storage_appliance_kitleapwindows_server_1903windows_server_2012windows_server_2008debian_linuxwindows_server_20h2ubuntu_linuxwindows_server_1909sambafedorawindows_server_2019Windows Server 2012 (Server Core installation)Windows Server 2019Windows Server 2008 R2 Service Pack 1Windows Server 2016 (Server Core installation)Windows Server 2012Windows Server 2012 R2Windows Server 2019 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server, version 1903 (Server Core installation)Windows Server, version 1909 (Server Core installation)Windows Server 2016Windows Server version 20H2Windows Server version 2004Netlogon
CVE-2022-0543
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-10||CRITICAL
EPSS-94.40% / 99.98%
||
7 Day CHG~0.00%
Published-18 Feb, 2022 | 19:25
Updated-10 Nov, 2025 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-18||Apply updates per vendor instructions.

It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.

Action-Not Available
Vendor-Redis Inc.Canonical Ltd.Debian GNU/Linux
Product-ubuntu_linuxdebian_linuxredisredisDebian-specific Redis Servers
CWE ID-CWE-862
Missing Authorization
CVE-2015-8104
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||CRITICAL
EPSS-0.33% / 55.62%
||
7 Day CHG~0.00%
Published-16 Nov, 2015 | 00:00
Updated-23 Apr, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncCanonical Ltd.Oracle CorporationXen ProjectDebian GNU/Linux
Product-solarisvm_virtualboxlinux_kernelubuntu_linuxxendebian_linuxn/a
CVE-2023-1523
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-10||CRITICAL
EPSS-0.12% / 31.22%
||
7 Day CHG~0.00%
Published-01 Sep, 2023 | 18:41
Updated-01 Oct, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.

Action-Not Available
Vendor-Canonical Ltd.
Product-snapdubuntu_linuxsnapd
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2026-6369
Matching Score-6
Assigner-Canonical Ltd.
ShareView Details
Matching Score-6
Assigner-Canonical Ltd.
CVSS Score-5.7||MEDIUM
EPSS-0.02% / 4.41%
||
7 Day CHG~0.00%
Published-20 Apr, 2026 | 13:38
Updated-20 Apr, 2026 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposed Session Token in canonical-livepatch client snap

An improper access control vulnerability in the canonical-livepatch snap client prior to version 10.15.0 allows a local unprivileged user to obtain a sensitive, root-level authentication token by sending an unauthenticated request to the livepatchd.sock Unix domain socket. This vulnerability is exploitable on systems where an administrator has already enabled the Livepatch client with a valid Ubuntu Pro subscription. This token allows an attacker to access Livepatch services using the victim's credentials, as well as potentially cause issues to the Livepatch server.

Action-Not Available
Vendor-Canonical Ltd.
Product-canonical-livepatch
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2009-3555
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.8||MEDIUM
EPSS-1.97% / 83.61%
||
7 Day CHG-0.32%
Published-09 Nov, 2009 | 17:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

Action-Not Available
Vendor-n/aCanonical Ltd.GNUF5, Inc.OpenSSLThe Apache Software FoundationMozilla CorporationDebian GNU/LinuxFedora Project
Product-debian_linuxubuntu_linuxgnutlsopensslfedoranssnginxhttp_servern/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-23220
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 22.72%
||
7 Day CHG~0.00%
Published-21 Jan, 2022 | 00:00
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

USBView 2.1 before 2.2 allows some local users (e.g., ones logged in via SSH) to execute arbitrary code as root because certain Polkit settings (e.g., allow_any=yes) for pkexec disable the authentication requirement. Code execution can, for example, use the --gtk-module option. This affects Ubuntu, Debian, and Gentoo.

Action-Not Available
Vendor-usbview_projectn/aCanonical Ltd.Debian GNU/LinuxGentoo Foundation, Inc.
Product-usbviewubuntu_linuxdebian_linuxlinuxn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2009-2408
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-1.85% / 83.09%
||
7 Day CHG~0.00%
Published-30 Jul, 2009 | 19:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.

Action-Not Available
Vendor-n/aCanonical Ltd.openSUSESUSEMozilla CorporationDebian GNU/Linux
Product-thunderbirdfirefoxdebian_linuxseamonkeyubuntu_linuxlinux_enterpriselinux_enterprise_servernetwork_security_servicesopensusen/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-13254
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-8.67% / 92.48%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 13:11
Updated-04 Aug, 2024 | 12:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.DjangoNetApp, Inc.Oracle CorporationFedora Project
Product-ubuntu_linuxdebian_linuxfedorazfs_storage_appliance_kitdjangosra_pluginsteelstore_cloud_integrated_storagen/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-13645
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.61% / 69.83%
||
7 Day CHG~0.00%
Published-28 May, 2020 | 11:55
Updated-04 Aug, 2024 | 12:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.

Action-Not Available
Vendor-n/aBroadcom Inc.Canonical Ltd.The GNOME ProjectNetApp, Inc.Fedora Project
Product-ubuntu_linuxcloud_backupglib-networkingfedorafabric_operating_systembalsan/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-12421
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-6.5||MEDIUM
EPSS-1.09% / 77.98%
||
7 Day CHG~0.00%
Published-09 Jul, 2020 | 14:39
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.

Action-Not Available
Vendor-Mozilla CorporationCanonical Ltd.
Product-firefoxubuntu_linuxthunderbirdfirefox_esrFirefoxFirefox ESRThunderbird
CWE ID-CWE-295
Improper Certificate Validation
CVE-2019-3814
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.7||HIGH
EPSS-1.57% / 81.60%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 12:20
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.

Action-Not Available
Vendor-Canonical Ltd.openSUSEDovecot
Product-ubuntu_linuxdovecotleapdovecot
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-15078
Matching Score-6
Assigner-OpenVPN Inc.
ShareView Details
Matching Score-6
Assigner-OpenVPN Inc.
CVSS Score-7.5||HIGH
EPSS-0.33% / 56.14%
||
7 Day CHG~0.00%
Published-26 Apr, 2021 | 13:19
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.

Action-Not Available
Vendor-openvpnn/aCanonical Ltd.Fedora ProjectDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxfedoraopenvpnOpenVPN
CWE ID-CWE-305
Authentication Bypass by Primary Weakness
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2008-4989
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.39% / 60.26%
||
7 Day CHG~0.00%
Published-13 Nov, 2008 | 00:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).

Action-Not Available
Vendor-n/aCanonical Ltd.openSUSEGNUSUSEDebian GNU/LinuxFedora Project
Product-debian_linuxubuntu_linuxlinux_enterprisegnutlslinux_enterprise_serverfedoraopensusen/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-8287
Matching Score-6
Assigner-Canonical Ltd.
ShareView Details
Matching Score-6
Assigner-Canonical Ltd.
CVSS Score-7.5||HIGH
EPSS-0.24% / 46.92%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 18:35
Updated-24 Sep, 2024 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Anbox Management Service, in versions 1.17.0 through 1.23.0, does not validate the TLS certificate provided to it by the Anbox Stream Agent. An attacker must be able to machine-in-the-middle the Anbox Stream Agent from within an internal network before they can attempt to take advantage of this.

Action-Not Available
Vendor-Canonical Ltd.
Product-anbox_cloudAnbox Cloudanbox_cloud
CWE ID-CWE-295
Improper Certificate Validation
CVE-2019-12524
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.55% / 68.01%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 18:35
Updated-04 Aug, 2024 | 23:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.

Action-Not Available
Vendor-n/aSquid CacheCanonical Ltd.Debian GNU/Linux
Product-ubuntu_linuxdebian_linuxsquidn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-11324
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.31% / 79.91%
||
7 Day CHG~0.00%
Published-18 Apr, 2019 | 00:00
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.

Action-Not Available
Vendor-n/aCanonical Ltd.Python Software Foundation
Product-ubuntu_linuxurllib3n/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-6156
Matching Score-6
Assigner-Canonical Ltd.
ShareView Details
Matching Score-6
Assigner-Canonical Ltd.
CVSS Score-3.8||LOW
EPSS-0.05% / 16.28%
||
7 Day CHG+0.01%
Published-05 Dec, 2024 | 23:11
Updated-26 Aug, 2025 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mark Laing discovered that LXD's PKI mode, until version 5.21.2, could be bypassed if the client's certificate was present in the trust store.

Action-Not Available
Vendor-Canonical Ltd.
Product-lxdLXDlxd
CWE ID-CWE-295
Improper Certificate Validation
CVE-2018-8034
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-11.72% / 93.72%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 18:00
Updated-21 Oct, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

Action-Not Available
Vendor-Canonical Ltd.The Apache Software FoundationDebian GNU/LinuxOracle Corporation
Product-retail_order_brokerubuntu_linuxdebian_linuxtomcatApache Tomcat
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-6219
Matching Score-6
Assigner-Canonical Ltd.
ShareView Details
Matching Score-6
Assigner-Canonical Ltd.
CVSS Score-3.8||LOW
EPSS-0.16% / 36.93%
||
7 Day CHG+0.04%
Published-05 Dec, 2024 | 23:13
Updated-13 Nov, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mark Laing discovered in LXD's PKI mode, until version 5.21.1, that a restricted certificate could be added to the trust store with its restrictions not honoured.

Action-Not Available
Vendor-Canonical Ltd.
Product-lxdLXD
CWE ID-CWE-295
Improper Certificate Validation
CVE-2007-0956
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-21.91% / 95.78%
||
7 Day CHG~0.00%
Published-06 Apr, 2007 | 01:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882.

Action-Not Available
Vendor-n/aCanonical Ltd.Debian GNU/LinuxMIT (Massachusetts Institute of Technology)
Product-debian_linuxubuntu_linuxkerberos_5n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2016-1252
Matching Score-6
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-6
Assigner-Debian GNU/Linux
CVSS Score-5.9||MEDIUM
EPSS-5.96% / 90.68%
||
7 Day CHG~0.00%
Published-05 Dec, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxadvanced_package_tooln/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2012-0955
Matching Score-6
Assigner-Canonical Ltd.
ShareView Details
Matching Score-6
Assigner-Canonical Ltd.
CVSS Score-6.8||MEDIUM
EPSS-0.12% / 31.13%
||
7 Day CHG~0.00%
Published-02 Dec, 2020 | 00:50
Updated-16 Sep, 2024 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
software-properties incorrectly validated TLS certificates

software-properties was vulnerable to a person-in-the-middle attack due to incorrect TLS certificate validation in softwareproperties/ppa.py. software-properties didn't check TLS certificates under python2 and only checked certificates under python3 if a valid certificate bundle was provided. Fixed in software-properties version 0.92.

Action-Not Available
Vendor-Canonical Ltd.
Product-software-propertiessoftware-properties
CWE ID-CWE-295
Improper Certificate Validation
CVE-2013-0776
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-4||MEDIUM
EPSS-0.65% / 70.99%
||
7 Day CHG~0.00%
Published-19 Feb, 2013 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.

Action-Not Available
Vendor-n/aMozilla CorporationopenSUSERed Hat, Inc.Debian GNU/LinuxCanonical Ltd.
Product-enterprise_linux_serverthunderbird_esrfirefoxseamonkeyopensuseenterprise_linux_ausenterprise_linux_desktopenterprise_linux_eusubuntu_linuxenterprise_linux_workstationthunderbirddebian_linuxn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2012-5821
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.24% / 46.77%
||
7 Day CHG~0.00%
Published-04 Nov, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function.

Action-Not Available
Vendor-lynxn/aCanonical Ltd.
Product-lynxubuntu_linuxn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2012-5783
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.8||MEDIUM
EPSS-0.62% / 69.99%
||
7 Day CHG~0.00%
Published-04 Nov, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Action-Not Available
Vendor-n/aCanonical Ltd.The Apache Software Foundation
Product-httpclientubuntu_linuxn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2012-2736
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.08% / 23.73%
||
7 Day CHG~0.00%
Published-26 Dec, 2019 | 19:53
Updated-06 Aug, 2024 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In NetworkManager 0.9.2.0, when a new wireless network was created with WPA/WPA2 security in AdHoc mode, it created an open/insecure network.

Action-Not Available
Vendor-network-managerCanonical Ltd.Debian GNU/LinuxopenSUSEThe GNOME Project
Product-opensusedebian_linuxnetworkmanagerubuntu_linuxnetwork-manager
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2026-3611
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-10||CRITICAL
EPSS-0.23% / 45.55%
||
7 Day CHG~0.00%
Published-12 Mar, 2026 | 20:06
Updated-30 Mar, 2026 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Honeywell IQ4x BMS Controller Missing authentication for critical function

The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentication in its factory-default configuration. With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface. Authentication controls are only enforced after a web user is created via U.htm, which dynamically enables the user module. Because this function is accessible prior to authentication, a remote user can create a new account with administrative read/write permissions enabling the user module and imposing authentication under attacker-controlled credentials. This action can effectively lock legitimate operators out of local and web-based configuration and administration.

Action-Not Available
Vendor-Honeywell International Inc.
Product-IQ412IQ4EIQ422IQ4NCIQ41xIQECOIQ3
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-39608
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-10||CRITICAL
EPSS-0.26% / 49.16%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 14:21
Updated-21 Aug, 2025 | 20:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A firmware update vulnerability exists in the login.cgi functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary firmware update. An attacker can send an unauthenticated message to trigger this vulnerability.

Action-Not Available
Vendor-WAVLINK Technology Ltd.
Product-wl-wn533a8_firmwarewl-wn533a8Wavlink AC3000
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-10640
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-10||CRITICAL
EPSS-0.86% / 75.16%
||
7 Day CHG~0.00%
Published-24 Feb, 2022 | 18:50
Updated-16 Apr, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ICSA-20-140-02 Emerson OpenEnterprise

Emerson OpenEnterprise versions through 3.3.4 may allow an attacker to run an arbitrary commands with system privileges or perform remote code execution via a specific communication service.

Action-Not Available
Vendor-emersonEmerson
Product-openenterprise_scada_serverOpenEnterprise SCADA Software
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2026-27897
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-10||CRITICAL
EPSS-0.09% / 25.99%
||
7 Day CHG+0.03%
Published-11 Mar, 2026 | 15:30
Updated-20 Mar, 2026 | 14:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vociferous Unauthenticated Remote Path Traversal (RCE via CSRF)

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and content. While the developer intended for a native UI dialog to handle the file path, the API does not validate the filename string before it is processed by the backends filesystem logic. Because the API is unauthenticated and the CORS configuration in app.py is overly permissive (allow_origins=["*"] or allowing localhost), an external attacker can bypass the UI entirely. By using directory traversal sequences (../), an attacker can force the app to write arbitrary data to any location accessible by the current user's permissions. This vulnerability is fixed in 4.4.2.

Action-Not Available
Vendor-wanderingastronomerWanderingAstronomer
Product-vociferousVociferous
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-26829
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-10||CRITICAL
EPSS-3.95% / 88.38%
||
7 Day CHG~0.00%
Published-09 Dec, 2020 | 16:28
Updated-04 Aug, 2024 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP NetWeaver AS JAVA (P2P Cluster Communication), versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows arbitrary connections from processes because of missing authentication check, that are outside the cluster and even outside the network segment dedicated for the internal cluster communication. As result, an unauthenticated attacker can invoke certain functions that would otherwise be restricted to system administrators only, including access to system administration functions or shutting down the system completely.

Action-Not Available
Vendor-SAP SE
Product-netweaver_application_server_javaSAP NetWeaver AS JAVA (P2P Cluster Communication)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-5644
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-10||CRITICAL
EPSS-1.91% / 83.38%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 18:30
Updated-16 Sep, 2024 | 22:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
C4G BLIS Improper Access Control

Computing For Good's Basic Laboratory Information System (also known as C4G BLIS) version 3.5 and earlier suffers from an instance of CWE-284, "Improper Access Control." As a result, an unauthenticated user may alter several facets of a user account, including promoting any user to an administrator.

Action-Not Available
Vendor-gatechComputing For Good
Product-computing_for_good\'s_basic_laboratory_information_systemBasic Laboratory Information System
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-51567
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||CRITICAL
EPSS-94.31% / 99.95%
||
7 Day CHG~0.00%
Published-29 Oct, 2024 | 00:00
Updated-07 Nov, 2025 | 19:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-11-28||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.

Action-Not Available
Vendor-n/aCyberPersons LLC
Product-cyberpaneln/acyberpanelCyberPanel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2026-1633
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-10||CRITICAL
EPSS-0.09% / 25.91%
||
7 Day CHG~0.00%
Published-03 Feb, 2026 | 23:02
Updated-04 Feb, 2026 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Synectix LAN 232 TRIO Missing Authentication for Critical Function

The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web management interface without requiring authentication, allowing unauthenticated users to modify critical device settings or factory reset the device.

Action-Not Available
Vendor-Synectix
Product-LAN 232 TRIO
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-48966
Matching Score-4
Assigner-Baxter Healthcare
ShareView Details
Matching Score-4
Assigner-Baxter Healthcare
CVSS Score-10||CRITICAL
EPSS-0.25% / 48.40%
||
7 Day CHG~0.00%
Published-14 Nov, 2024 | 21:38
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Life2000 service tools for test and calibration do not support user authentication

The software tools used by service personnel to test & calibrate the ventilator do not support user authentication. An attacker with access to the Service PC where the tools are installed could obtain diagnostic information through the test tool or manipulate the ventilator's settings and embedded software via the calibration tool, without having to authenticate to either tool. This could result in unauthorized disclosure of information and/or have unintended impacts on device settings and performance.

Action-Not Available
Vendor-Baxter International, Inc.
Product-Life2000 Ventilation Systemlife2000_ventilator_firmware
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-9574
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-9.9||CRITICAL
EPSS-0.07% / 21.67%
||
7 Day CHG~0.00%
Published-20 Oct, 2025 | 16:56
Updated-24 Oct, 2025 | 10:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authentication Vulnerability

Missing Authentication for Critical Function vulnerability in ABB ALS-mini-s4 IP, ABB ALS-mini-s8 IP.This issue affects .  All firmware versions with the Serial Number from 2000 to 5166

Action-Not Available
Vendor-ABB
Product-ALS-mini-s8 IPALS-mini-s4 IP
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-46506
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||CRITICAL
EPSS-91.48% / 99.67%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 00:00
Updated-17 Jun, 2025 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NetAlertX 23.01.14 through 24.x before 24.10.12 allows unauthenticated command injection via settings update because function=savesettings lacks an authentication requirement, as exploited in the wild in May 2025. This is related to settings.php and util.php.

Action-Not Available
Vendor-netalertxNetAlertX
Product-netalertxNetAlertX
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-68121
Matching Score-4
Assigner-Go Project
ShareView Details
Matching Score-4
Assigner-Go Project
CVSS Score-7.4||HIGH
EPSS-0.02% / 4.54%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 17:48
Updated-20 Feb, 2026 | 17:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unexpected session resumption in crypto/tls

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

Action-Not Available
Vendor-Go standard libraryGo
Product-gocrypto/tls
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-2013
Matching Score-4
Assigner-Hitachi Energy
ShareView Details
Matching Score-4
Assigner-Hitachi Energy
CVSS Score-10||CRITICAL
EPSS-0.09% / 25.16%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 13:14
Updated-15 Aug, 2024 | 21:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability exists in the FOXMAN-UN/UNEM server / API Gateway component that if exploited allows attackers without any access to interact with the services and the post-authentication attack surface.

Action-Not Available
Vendor-Hitachi Energy Ltd.
Product-foxman-ununemFOXMAN-UNUNEM
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-11639
Matching Score-4
Assigner-Ivanti
ShareView Details
Matching Score-4
Assigner-Ivanti
CVSS Score-10||CRITICAL
EPSS-6.15% / 90.86%
||
7 Day CHG~0.00%
Published-10 Dec, 2024 | 18:54
Updated-17 Jan, 2025 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass in the admin web console of Ivanti CSA before 5.0.3 allows a remote unauthenticated attacker to gain administrative access

Action-Not Available
Vendor-Ivanti Software
Product-cloud_services_applianceCloud Services Application
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-42017
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||CRITICAL
EPSS-0.16% / 36.08%
||
7 Day CHG~0.00%
Published-30 Sep, 2024 | 00:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Atos Eviden iCare 2.7.1 through 2.7.11. The application exposes a web interface locally. In the worst-case scenario, if the application is remotely accessible, it allows an attacker to execute arbitrary commands with system privilege on the endpoint hosting the application, without any authentication.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-20703
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-10||CRITICAL
EPSS-2.00% / 83.73%
||
7 Day CHG~0.00%
Published-10 Feb, 2022 | 17:06
Updated-28 Oct, 2025 | 13:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-17||Apply updates per vendor instructions.
Cisco Small Business RV Series Routers Vulnerabilities

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv340w_firmwarerv260rv160rv160wrv160w_firmwarerv345_firmwarerv345prv260prv160_firmwarerv260w_firmwarerv260wrv260p_firmwarerv340wrv340_firmwarerv345p_firmwarerv340rv260_firmwarerv345Cisco Small Business RV Series Router FirmwareSmall Business RV160, RV260, RV340, and RV345 Series Routers
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-61956
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-10||CRITICAL
EPSS-0.17% / 38.58%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 16:15
Updated-12 Nov, 2025 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authentication for Critical Function in Radiometrics VizAir

Radiometrics VizAir is vulnerable to a lack of authentication mechanisms for critical functions, such as admin access and API requests. Attackers can modify configurations without authentication, potentially manipulating active runway settings and misleading air traffic control (ATC) and pilots. Additionally, manipulated meteorological data could mislead forecasters and ATC, causing inaccurate flight planning.

Action-Not Available
Vendor-radiometricsRadiometrics
Product-vizairVizAir
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-61945
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-10||CRITICAL
EPSS-0.18% / 38.76%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 16:10
Updated-12 Nov, 2025 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authentication for Critical Function in Radiometrics VizAir

Radiometrics VizAir is vulnerable to any remote attacker via access to the admin panel of the VizAir system without authentication. Once inside, the attacker can modify critical weather parameters such as wind shear alerts, inversion depth, and CAPE values, which are essential for accurate weather forecasting and flight safety. This unauthorized access could result in the disabling of vital alerts, causing hazardous conditions for aircraft, and manipulating runway assignments, which could result in mid-air conflicts or runway incursions.

Action-Not Available
Vendor-radiometricsRadiometrics
Product-vizairVizAir
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-58083
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.2||CRITICAL
EPSS-0.08% / 23.84%
||
7 Day CHG+0.01%
Published-14 Nov, 2025 | 23:24
Updated-18 Nov, 2025 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
General Industrial Controls Lynx+ Gateway Missing Authentication for Critical Function

General Industrial Controls Lynx+ Gateway  is missing critical authentication in the embedded web server which could allow an attacker to remotely reset the device.

Action-Not Available
Vendor-General Industrial Controls
Product-Lynx+ Gateway
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-48426
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-10||CRITICAL
EPSS-0.10% / 28.29%
||
7 Day CHG~0.00%
Published-05 Apr, 2024 | 15:23
Updated-28 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Chromecast Bootloader & Kernel-level code-execution including compromise of user-data

u-boot bug that allows for u-boot shell and interrupt over UART

Action-Not Available
Vendor-Google LLC
Product-Chromecastchromecast
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-4699
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-10||CRITICAL
EPSS-0.91% / 75.95%
||
7 Day CHG~0.00%
Published-06 Nov, 2023 | 05:02
Updated-16 Dec, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Command Execution Vulnerability in Mitsubishi Electric proprietary protocol communication of multiple FA products

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC-F Series CPU modules, MELSEC iQ-F Series, MELSEC iQ-R series CPU modules, MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series, MELSEC-L series, Mitsubishi Electric CNC M800V/M80V series, Mitsubishi Electric CNC M800/M80/E80 series and Mitsubishi Electric CNC M700V/M70V/E70 series allows a remote unauthenticated attacker to execute arbitrary commands by sending specific packets to the affected products. This could lead to disclose or tamper with information by reading or writing control programs, or cause a denial-of-service (DoS) condition on the products by resetting the memory contents of the products to factory settings or resetting the products remotely.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-fx3u-64mr\/ds_firmwarefx3uc-32mt-lt-2fx3u-128mt\/ess_firmwarefx3u-48mt\/es-a_firmwarefx5u-64mr\/dsfx3u-32ms\/esfx3g-14mt\/es-afx3s-10mr\/es_firmwarefx5uj-24mt\/es-a_firmwarefx3ge-24mt\/dsfx3u-64mr\/ua1fx3u-16mr\/es_firmwarefx5uc-64mt\/d_firmwarefx3u-80mt\/dsfx3ge-40mt\/dssfx3u-48mt\/dsfx3u-80mr\/es_firmwarefx5uj-24mr\/ds_firmwarefx3u-64mr\/es_firmwarefx3g-24mr\/es-a_firmwarefx3u-16mr\/es-afx3u-128mt\/es-afx5u-80mt\/dss_firmwarefx5u-32mt\/ess_firmwarefx3s-14mt\/esfx5u-32mt\/ds_firmwarefx3g-60mt\/es_firmwarefx5uj-40mr\/es-afx5uj-60mt\/dsfx3uc-96mt\/dfx5s-30mt\/ess_firmwarefx3s-30mt\/esfx3g-24mt\/ds_firmwarefx3ge-24mt\/ds_firmwarefx5u-64mt\/dss_firmwarefx5u-80mr\/dsfx5uc-32mt\/ds-ts_firmwarefx3uc-64mt\/dssfx3u-64mt\/esfx3g-24mt\/es-afx3ge-40mr\/dsfx5s-80mr\/es_firmwarefx3s-30mr\/es-2adfx5s-60mt\/ess_firmwarefx3g-24mt\/dss_firmwarefx5uj-24mt\/dss_firmwarefx3s-30mr\/ds_firmwarefx3u-16mt\/es_firmwarefx3sa-30mr-cm_firmwarefx3gc-32mt\/d_firmwarefx3ge-24mt\/dssfx3ga-24mr-cmfx3uc-96mt\/dss_firmwarefx5uc-32mt\/ds-tsfx3u-16mt\/dss_firmwarefx3g-14mr\/es-afx3sa-10mr-cmfx3g-60mt\/dssfx3s-14mt\/es_firmwarefx3g-40mt\/es-afx5uj-24mr\/es_firmwarefx5uj-24mr\/esfx3uc-32mt-lt_firmwarefx3ga-24mr-cm_firmwarefx5uj-24mt\/essfx5s-60mr\/esfx5uc-32mt\/dss_firmwarefx3uc-32mt\/dfx3uc-16mt\/dss-p4fx3sa-10mt-cmfx5s-60mt\/essfx5u-80mr\/esfx3g-40mt\/dsfx5u-80mt\/dssfx3g-60mr\/es-a_firmwarefx3s-20mt\/ds_firmwarefx3u-128mt\/es-a_firmwarefx3uc-32mt\/dss_firmwarefx3ge-24mt\/dss_firmwarefx3uc-16mt\/d_firmwarefx3g-40mt\/essfx5uj-24mr\/es-a_firmwarefx3u-16mr\/es-a_firmwarefx3g-14mt\/ess_firmwarefx3u-48mt\/dss_firmwarefx3s-20mt\/dssfx5uj-60mt\/esfx5uc-96mt\/dssfx3u-16mt\/ess_firmwarefx3g-40mt\/dssfx5uj-40mt\/dsfx3u-32mr\/es_firmwarefx3ge-24mr\/esfx3sa-14mr-cmfx3u-128mr\/es-afx3g-14mr\/es_firmwarefx5uj-60mr\/es-a_firmwarefx3ge-24mt\/es_firmwarefx3g-14mt\/dss_firmwarefx3ge-24mt\/ess_firmwarefx3u-64mt\/dsfx5u-80mt\/ess_firmwarefx3g-14mt\/ds_firmwarefx3u-80mt\/es-afx3gc-32mt\/dss_firmwarefx3u-48mr\/es_firmwarefx3g-40mr\/dsfx3uc-64mt\/dss_firmwarefx3u-128mr\/ds_firmwarefx3s-30mt\/es-2ad_firmwarefx3u-64mr\/es-afx3sa-20mt-cm_firmwarefx3s-10mr\/esfx3s-10mt\/ess_firmwarefx3u-80mt\/ds_firmwarefx5u-64mt\/dssfx5s-40mt\/esfx3s-20mr\/esfx3u-80mt\/dssfx3u-16mr\/esfx3g-60mt\/essfx5u-64mt\/dsfx3s-14mt\/dssfx3g-24mt\/essfx3ge-24mt\/essfx3s-14mr\/ds_firmwarefx5u-80mt\/dsfx5uc-96mt\/d_firmwarefx5uc-64mt\/dfx3ge-40mt\/dss_firmwarefx3g-60mr\/esfx3g-40mr\/es_firmwarefx5uj-40mt\/ess_firmwarefx3u-48mt\/dssfx3ge-40mt\/dsfx3ge-40mr\/ds_firmwarefx3g-24mt\/esfx3uc-16mr\/d-tfx3s-10mt\/dsfx5uj-24mt\/es-afx5u-32mt\/esfx3s-30mt\/ess-2adfx3g-60mr\/es_firmwarefx3ga-40mr-cmfx3sa-14mt-cmfx3u-128mt\/dsfx3u-32mt\/dsfx5uj-60mr\/ds_firmwarefx3u-64ms\/esfx3s-10mt\/esfx3ge-40mr\/esfx5uj-60mt\/dss_firmwarefx3s-10mt\/essfx5s-80mt\/es_firmwarefx3g-40mt\/esfx5u-32mt\/dsfx3u-64mr\/ua1_firmwarefx3u-64mt\/ds_firmwarefx3u-128mt\/dssfx3ge-40mt\/essfx3sa-20mr-cm_firmwarefx5s-80mt\/ess_firmwarefx3ge-24mr\/ds_firmwarefx3u-48mt\/ds_firmwarefx3uc-32mt-ltfx3u-32mt\/essfx3u-32mr\/ds_firmwarefx5uj-60mt\/es-a_firmwarefx5s-80mt\/essfx3g-24mt\/ess_firmwarefx3g-60mt\/dss_firmwarefx3sa-10mr-cm_firmwarefx3u-128mt\/essfx3u-16mt\/esfx3u-32mt\/es-a_firmwarefx5u-32mt\/es_firmwarefx3u-80mr\/es-a_firmwarefx3g-60mr\/ds_firmwarefx3s-20mt\/dsfx3ge-24mr\/dsfx3ga-60mt-cm_firmwarefx5uj-60mr\/es-afx3s-30mr\/es_firmwarefx5s-30mr\/es_firmwarefx3u-32mr\/dsfx3u-64mt\/es-a_firmwarefx3s-30mt\/ess-2ad_firmwarefx5s-40mr\/es_firmwarefx5s-40mt\/essfx3u-16mt\/ds_firmwarefx5u-80mr\/es_firmwarefx3ga-60mt-cmfx5uc-32mt\/d_firmwarefx3g-14mt\/esfx3sa-14mt-cm_firmwarefx3ge-40mt\/ess_firmwarefx3sa-14mr-cm_firmwarefx5uj-40mt\/dss_firmwarefx3s-10mr\/ds_firmwarefx3g-24mr\/es_firmwarefx3uc-16mr\/d-t_firmwarefx3g-14mt\/es_firmwarefx3s-14mt\/ess_firmwarefx3g-24mr\/dsfx5u-32mt\/essfx5uj-60mt\/ess_firmwarefx3u-64mt\/essfx3s-30mt\/dsfx3g-24mt\/es-a_firmwarefx5uc-32mr\/ds-tsfx3u-32mt\/ess_firmwarefx3g-60mt\/ess_firmwarefx3g-24mt\/dssfx5u-80mt\/es_firmwarefx3s-30mr\/es-2ad_firmwarefx5uj-40mr\/dsfx3u-48mt\/ess_firmwarefx5s-30mt\/esfx3u-64mt\/dss_firmwarefx3uc-64mt\/dfx3u-80mt\/dss_firmwarefx3g-14mt\/dssfx3g-14mr\/es-a_firmwarefx5s-40mt\/ess_firmwarefx3s-14mr\/esfx5uj-40mt\/es_firmwarefx3s-20mt\/ess_firmwarefx3uc-16mt\/d-p4_firmwarefx3sa-30mt-cmfx3uc-96mt\/d_firmwarefx5uj-24mt\/ess_firmwarefx5uj-24mt\/es_firmwarefx3g-40mt\/es_firmwarefx3g-60mr\/es-afx5u-80mt\/ds_firmwarefx3u-128mr\/es-a_firmwarefx5s-30mt\/essfx3u-64mt\/dssfx3g-14mr\/esfx5s-30mr\/esfx3s-20mr\/dsfx5u-32mr\/es_firmwarefx5uj-40mt\/es-afx3uc-16mt\/dssfx3ga-60mr-cm_firmwarefx3u-48mr\/ds_firmwarefx3s-10mt\/dssfx5s-40mr\/esfx5s-30mt\/es_firmwarefx3u-16mr\/dsfx3ga-40mt-cmfx5uj-40mr\/ds_firmwarefx3s-30mt\/dssfx3u-80mt\/esfx3s-14mr\/dsfx3u-80mt\/ess_firmwarefx3sa-30mr-cmfx5uj-24mt\/dsfx3g-24mr\/es-afx3u-32mr\/es-a_firmwarefx3u-128mr\/esfx3g-60mt\/esfx5uj-60mr\/es_firmwarefx3u-16mt\/dssfx5uj-24mt\/dssfx3u-32mr\/esfx3s-30mr\/esfx3u-64mt\/es_firmwarefx3g-40mt\/dss_firmwarefx5u-64mt\/ess_firmwarefx3u-16mt\/essfx3s-20mt\/essfx3u-128mt\/efx5uc-32mt\/dss-ts_firmwarefx3u-48mt\/essfx3uc-32mt\/d_firmwarefx3ga-60mr-cmfx3g-60mt\/es-afx3u-32mr\/ua1_firmwarefx3u-32mt\/es_firmwarefx3uc-16mt\/dfx3ga-24mt-cmfx3ge-40mt\/es_firmwarefx3g-24mr\/esfx5uj-40mr\/es_firmwarefx3g-60mt\/dsfx5uj-60mt\/es-afx3s-10mt\/ds_firmwarefx5u-64mt\/es_firmwarefx3u-32mt\/es-afx3ge-40mt\/ds_firmwarefx3s-10mt\/es_firmwarefx3gc-32mt\/dfx3u-32mr\/es-afx5uj-24mr\/dsfx5u-80mt\/essfx3u-64ms\/es_firmwarefx3s-30mt\/ds_firmwarefx5u-64mt\/essfx3u-32mt\/dss_firmwarefx3u-16mt\/dsfx5uj-24mr\/es-afx3g-60mr\/dsfx5u-64mr\/ds_firmwarefx5s-80mr\/esfx3s-20mr\/ds_firmwarefx3sa-20mt-cmfx3uc-16mr\/ds-t_firmwarefx3u-48mr\/es-a_firmwarefx3g-14mt\/dsfx5uc-64mt\/dssfx3u-32ms\/es_firmwarefx3g-40mr\/es-afx3ge-24mt\/esfx3s-14mt\/dss_firmwarefx5uj-60mr\/dsfx3g-14mt\/es-a_firmwarefx5uj-24mt\/ds_firmwarefx3sa-30mt-cm_firmwarefx3u-80mr\/esfx3g-40mt\/ess_firmwarefx3u-64mt\/ess_firmwarefx3u-80mt\/essfx5uj-60mt\/es_firmwarefx3uc-32mt\/dssfx3g-40mr\/es-a_firmwarefx3ge-40mt\/esfx3s-14mt\/dsfx5uc-64mt\/dss_firmwarefx5uj-40mt\/ds_firmwarefx5s-80mt\/esfx3u-48mr\/es-afx3s-30mt\/dss_firmwarefx3gc-32mt\/dssfx3s-10mr\/dsfx5u-64mt\/ds_firmwarefx3ge-40mr\/es_firmwarefx5uj-40mt\/essfx5uc-32mt\/dssfx3u-16mt\/es-afx3u-80mt\/es-a_firmwarefx3u-16mt\/es-a_firmwarefx3uc-16mt\/d-p4fx3u-128mt\/dss_firmwarefx3g-40mt\/ds_firmwarefx3ge-24mr\/es_firmwarefx3u-32mr\/ua1fx3g-14mr\/ds_firmwarefx3g-60mt\/es-a_firmwarefx3g-60mt\/ds_firmwarefx5uj-40mt\/es-a_firmwarefx5u-64mt\/esfx3u-48mt\/es_firmwarefx3uc-16mt\/dss-p4_firmwarefx3u-80mr\/es-afx3s-14mr\/es_firmwarefx5u-32mr\/esfx3g-14mr\/dsfx3ga-40mt-cm_firmwarefx3u-80mr\/ds_firmwarefx3u-48mt\/esfx5uj-60mt\/dssfx5uj-40mt\/dssfx3s-20mr\/es_firmwarefx5uj-60mr\/esfx3s-30mt\/ess_firmwarefx3u-32mt\/esfx3sa-20mr-cmfx3ga-24mt-cm_firmwarefx3sa-10mt-cm_firmwarefx3u-48mr\/dsfx3u-64mr\/dsfx3u-80mr\/dsfx5uc-32mt\/dss-tsfx5uj-40mt\/esfx3u-64mr\/es-a_firmwarefx3s-30mt\/essfx3g-40mr\/esfx5u-64mr\/esfx3u-48mt\/es-afx5uc-32mr\/ds-ts_firmwarefx3uc-32mt-lt-2_firmwarefx3u-32mt\/ds_firmwarefx3u-128mt\/ds_firmwarefx3g-24mr\/ds_firmwarefx3u-64mt\/es-afx3g-14mt\/essfx3s-20mt\/dss_firmwarefx3s-14mt\/essfx3g-24mt\/es_firmwarefx3uc-16mt\/dss_firmwarefx3g-24mt\/dsfx5u-32mr\/dsfx5uj-60mt\/ds_firmwarefx5s-60mr\/es_firmwarefx5u-80mt\/esfx3u-128mr\/es_firmwarefx3u-16mr\/ds_firmwarefx3s-20mt\/esfx5u-32mt\/dss_firmwarefx5uj-24mt\/esfx3uc-16mr\/ds-tfx3s-30mr\/dsfx5uj-40mr\/es-a_firmwarefx3u-128mr\/dsfx3s-14mt\/ds_firmwarefx5s-60mt\/es_firmwarefx3u-80mt\/es_firmwarefx5uj-40mr\/esfx3uc-64mt\/d_firmwarefx3uc-96mt\/dssfx3u-48mr\/esfx5s-60mt\/esfx3s-30mt\/es_firmwarefx5u-64mr\/es_firmwarefx3u-64mr\/esfx5uc-32mt\/dfx5u-32mr\/ds_firmwarefx3s-10mt\/dss_firmwarefx5uc-96mt\/dfx3s-20mt\/es_firmwarefx3u-32mt\/dssfx3s-30mt\/es-2adfx5uj-60mt\/essfx3g-40mt\/es-a_firmwarefx3ga-40mr-cm_firmwarefx5uc-96mt\/dss_firmwarefx5s-40mt\/es_firmwarefx5u-80mr\/ds_firmwarefx3g-40mr\/ds_firmwarefx3u-128mt\/e_firmwarefx5u-32mt\/dssMELSEC-F Series FX3G-14MT/ES-AMELSEC-F Series FX3S-20MT/ESSMELSEC-F Series FX3U-64MT/ESMELSEC-F Series FX3S-30MT/ESSMELSEC Q Series QD77GF8MELSEC-F Series FX3U-128MT/DSSMELSEC iQ-R Series R120PCPUMELSEC-F Series FX3UC-96MT/DMELSEC-F Series FX3U-32MT/ES-AMELSEC-F Series FX3U-32MT/ESSMELSEC-F Series FX3GE-40MR/DSMitsubishi Electric CNC M700V Series M720VWMELSEC-F Series FX3U-64MR/UA1MELSEC-F Series FX3U-32MR/ES-AMELSEC iQ-F Series FX5UJ-60MR/DSMELSEC iQ-F Series FX5U-64MT/ESSMELSEC iQ-F Series FX5UJ-24MT/DSMELSEC-F Series FX3U-128MR/ESMELSEC iQ-F Series FX5U-80MT/DSSMELSEC iQ-L Series LD78G16MELSEC-F Series FX3U-16MT/ESMELSEC-F Series FX3U-64MR/DSMELSEC-F Series FX3G-60MT/DSSMELSEC iQ-R Series R08PCPUMELSEC-F Series FX3S-10MR/DSMELSEC-F Series FX3U-128MT/DSMELSEC iQ-R Series R16MTCPUMELSEC-F Series FX3GE-24MT/ESMELSEC iQ-F Series FX5S-60MT/ESSMELSEC-F Series FX3GE-40MR/ESMELSEC-F Series FX3UC-16MR/D-TMELSEC-F Series FX3S-20MR/DSMELSEC iQ-R Series R120ENCPUMELSEC iQ-F Series FX5U-32MR/ESMELSEC-F Series FX3U-80MT/DSMELSEC-F Series FX3UC-32MT/DMELSEC-F Series FX3G-24MT/DSMELSEC iQ-F Series FX5S-80MR/ESMELSEC iQ-F Series FX5-80SSC-SMELSEC-F Series FX3U-80MR/ESMELSEC iQ-R Series R64MTCPUMELSEC iQ-F Series FX5U-32MT/ESMELSEC iQ-F Series FX5S-80MT/ESMELSEC iQ-F Series FX5UJ-24MT/DSSMELSEC-F Series FX3G-60MT/ES-AMELSEC-F Series FX3GE-24MT/DSMELSEC iQ-R Series R16PCPUMELSEC-F Series FX3S-30MR/DSMELSEC iQ-F Series FX5UJ-60MT/ES-AMELSEC iQ-F Series FX5U-64MR/DSMELSEC iQ-F Series FX5U-80MR/DSMELSEC-F Series FX3G-14MT/ESSMELSEC-F Series FX3UC-16MT/DSS-P4MELSEC iQ-R Series R04CPUMELSEC-F Series FX3S-14MR/ESMELSEC iQ-F Series FX5UC-32MR/DS-TSMELSEC iQ-F Series FX5UJ-60MT/ESMELSEC iQ-R Series RD77MS8MELSEC iQ-R Series RD77MS4MELSEC iQ-F Series FX5S-40MT/ESSMELSEC iQ-F Series FX5UJ-24MT/ESMELSEC iQ-F Series FX5UJ-60MT/ESSMELSEC iQ-R Series R16ENCPUMELSEC-F Series FX3G-14MR/ESMELSEC-F Series FX3S-10MR/ESMELSEC-F Series FX3U-48MT/DSSMELSEC iQ-F Series FX5UJ-40MT/DSMELSEC iQ-R Series R16CPUMELSEC-F Series FX3U-16MT/ESSMELSEC L Series LD77MS16MELSEC-F Series FX3G-40MR/ESMELSEC-F Series FX3U-16MR/ESMELSEC iQ-F Series FX5UJ-24MR/ESMELSEC iQ-F Series FX5S-60MT/ESMELSEC-F Series FX3S-14MR/DSMELSEC-F Series FX3GE-24MT/DSSMELSEC-F Series FX3U-32MT/ESMELSEC iQ-F Series FX5U-64MT/DSSMELSEC-F Series FX3U-16MR/DSMELSEC-F Series FX3S-20MT/ESMELSEC-F Series FX3U-64MS/ESMELSEC iQ-R Series RD78G8MELSEC-F Series FX3S-30MT/ESS-2ADMELSEC-F Series FX3GA-24MT-CMMELSEC iQ-R Series R04ENCPUMELSEC iQ-R Series RD77MS16MELSEC iQ-F Series FX5U-80MT/DSMELSEC-F Series FX3U-128MT/ESSMitsubishi Electric CNC M80V Series M80VMELSEC-F Series FX3U-48MR/ESMELSEC iQ-F Series FX5-40SSC-SMELSEC iQ-F Series FX5S-30MT/ESSMELSEC-F Series FX3SA-20MT-CMMELSEC iQ-F Series FX5UC-64MT/DSSMELSEC-F Series FX3U-128MR/DSMELSEC iQ-F Series FX5UC-32MT/DSS-TSMELSEC-F Series FX3U-32MT/DSSMELSEC iQ-F Series FX5UJ-40MT/ES-AMELSEC-F Series FX3U-16MT/ES-AMELSEC iQ-F Series FX5UJ-24MR/DSMELSEC-F Series FX3UC-32MT/DSSMELSEC iQ-F Series FX5UC-96MT/DSSMitsubishi Electric CNC M700V Series M720VSMELSEC-F Series FX3U-64MT/DSSMELSEC-F Series FX3G-24MT/ESMELSEC-F Series FX3G-60MT/ESSMitsubishi Electric CNC E80 Series E80MELSEC iQ-F Series FX5UC-64MT/DMELSEC iQ-R Series RD78G4MELSEC-F Series FX3SA-20MR-CMMELSEC-F Series FX3GE-24MR/DSMELSEC-F Series FX3GA-60MT-CMMELSEC-F Series FX3U-64MR/ES-AMELSEC iQ-F Series FX5U-64MR/ESMitsubishi Electric CNC M80 Series M80WMELSEC-F Series FX3GA-24MR-CMMELSEC iQ-F Series FX5S-80MT/ESSMELSEC-F Series FX3S-14MT/DSSMELSEC-F Series FX3S-30MT/DSMELSEC-F Series FX3UC-32MT-LTMELSEC-F Series FX3G-40MT/ESMELSEC-F Series FX3S-20MR/ESMitsubishi Electric CNC M80 Series M80Mitsubishi Electric CNC M70V Series M70VMELSEC iQ-F Series FX5UC-32MT/DS-TSMELSEC-F Series FX3G-24MR/ES-AMELSEC-F Series FX3U-80MR/ES-AMELSEC-F Series FX3GA-60MR-CMMELSEC-F Series FX3U-80MT/ESSMELSEC-F Series FX3G-24MT/ES-AMELSEC-F Series FX3G-40MT/ESSMELSEC-F Series FX3G-60MT/ESMELSEC-F Series FX3G-40MR/DSMELSEC L Series LD77MS4MELSEC-F Series FX3S-14MT/ESSMELSEC-F Series FX3GE-40MT/DSSMELSEC iQ-F Series FX5S-30MT/ESMELSEC-F Series FX3GA-40MT-CMMELSEC-F Series FX3U-32MR/DSMELSEC-F Series FX3GE-40MT/ESMELSEC iQ-R Series RD78G32MELSEC iQ-L Series LD78G4MELSEC-F Series FX3U-128MR/ES-AMELSEC iQ-F Series FX5UC-96MT/DMELSEC-F Series FX3G-40MT/DSMELSEC iQ-F Series FX5U-64MT/DSMELSEC iQ-F Series FX5U-80MT/ESMELSEC Q Series QD77MS2MELSEC-F Series FX3G-60MR/DSMELSEC-F Series FX3U-32MR/UA1MELSEC-F Series FX3GE-24MT/ESSMELSEC-F Series FX3GA-40MR-CMMELSEC iQ-R Series RD78G64MELSEC-F Series FX3GE-40MT/DSMELSEC-F Series FX3UC-16MT/DMELSEC-F Series FX3U-128MT/ESMELSEC-F Series FX3U-16MT/DSMitsubishi Electric CNC M800 Series M800WMELSEC-F Series FX3UC-16MR/DS-TMitsubishi Electric CNC M700V Series M750VWMELSEC-F Series FX3GC-32MT/DMELSEC iQ-F Series FX5UC-32MT/DMELSEC-F Series FX3U-80MT/ESMELSEC-F Series FX3UC-32MT-LT-2MELSEC-F Series FX3U-48MR/DSMELSEC iQ-F Series FX5U-32MR/DSMELSEC iQ-F Series FX5S-60MR/ESMELSEC iQ-F Series FX5U-32MT/ESSMELSEC iQ-F Series FX5U-32MT/DSSMitsubishi Electric CNC M700V Series M730VSMELSEC-F Series FX3G-14MR/ES-AMELSEC iQ-F Series FX5-40SSC-GMELSEC Q Series Q172DSCPUMELSEC iQ-F Series FX5S-30MR/ESMitsubishi Electric CNC M80V Series M80VWMELSEC-F Series FX3U-48MT/ESSMELSEC iQ-R Series RD78GHVMELSEC-F Series FX3S-10MT/ESMELSEC iQ-F Series FX5UJ-40MR/ES-AMELSEC-F Series FX3S-10MT/DSSMitsubishi Electric CNC M700V Series M750VSMELSEC-F Series FX3G-14MT/DSMELSEC-F Series FX3SA-14MT-CMMELSEC iQ-R Series RD77GF16MELSEC-F Series FX3U-80MR/DSMELSEC iQ-R Series R32PCPUMELSEC-F Series FX3S-20MT/DSSMELSEC Q Series QD77GF4Mitsubishi Electric CNC M800 Series M800SMELSEC iQ-F Series FX5UJ-40MT/ESMELSEC iQ-F Series FX5UJ-60MT/DSMELSEC-F Series FX3G-24MR/ESMELSEC iQ-F Series FX5U-80MR/ESMELSEC iQ-F Series FX5UJ-40MT/ESSMitsubishi Electric CNC M800V Series M800VSMELSEC iQ-F Series FX5UJ-40MR/ESMELSEC iQ-F Series FX5UJ-60MR/ES-AMELSEC Q Series QD77GF16MELSEC iQ-R Series RD77MS2MELSEC-F Series FX3GC-32MT/DSSMELSEC-F Series FX3U-64MR/ESMELSEC-F Series FX3G-14MT/ESMELSEC-F Series FX3GE-24MR/ESMELSEC-F Series FX3S-20MT/DSMELSEC-F Series FX3SA-10MR-CMMELSEC iQ-R Series RD78G16MELSEC-F Series FX3U-64MT/DSMELSEC-F Series FX3U-128MT/ES-AMELSEC-F Series FX3SA-10MT-CMMELSEC-F Series FX3G-40MR/ES-AMELSEC-F Series FX3U-64MT/ES-AMELSEC iQ-R Series RD78GHWMELSEC iQ-F Series FX5U-80MT/ESSMELSEC iQ-F Series FX5UJ-60MR/ESMELSEC-F Series FX3G-24MT/ESSMELSEC iQ-F Series FX5UJ-60MT/DSSMELSEC-F Series FX3S-30MT/DSSMELSEC iQ-R Series R32MTCPUMELSEC iQ-R Series RD77GF8MELSEC L Series LD77MS2MELSEC-F Series FX3U-48MT/ESMELSEC-F Series FX3U-32MS/ESMELSEC iQ-F Series FX5U-32MT/DSMELSEC-F Series FX3G-24MT/DSSMELSEC iQ-R Series R32CPUMELSEC iQ-F Series FX5S-40MR/ESMitsubishi Electric CNC M800V Series M800VWMELSEC-F Series FX3U-48MT/ES-AMELSEC-F Series FX3UC-16MT/D-P4MELSEC iQ-R Series RD77GF4MELSEC iQ-F Series FX5U-64MT/ESMELSEC iQ-R Series R08CPUMELSEC-F Series FX3SA-30MT-CMMELSEC iQ-F Series FX5UC-32MT/DSSMELSEC-F Series FX3S-14MT/ESMELSEC-F Series FX3G-14MR/DSMELSEC-F Series FX3S-10MT/DSMELSEC Q Series Q173DSCPUMELSEC iQ-F Series FX5S-40MT/ESMELSEC-F Series FX3UC-96MT/DSSMELSEC-F Series FX3SA-30MR-CMMELSEC-F Series FX3U-32MR/ESMELSEC-F Series FX3S-30MR/ES-2ADMELSEC-F Series FX3SA-14MR-CMMELSEC-F Series FX3G-60MR/ES-AMELSEC-F Series FX3U-48MR/ES-AMitsubishi Electric CNC M700V Series M730VWMELSEC iQ-F Series FX5-80SSC-GMELSEC iQ-F Series FX5UJ-24MT/ES-AMELSEC iQ-F Series FX5UJ-24MT/ESSMELSEC-F Series FX3U-80MT/DSSMELSEC-F Series FX3UC-64MT/DSSMELSEC-F Series FX3S-30MT/ESMELSEC-F Series FX3U-48MT/DSMELSEC iQ-F Series FX5UJ-40MT/DSSMELSEC iQ-R Series R120CPUMELSEC-F Series FX3UC-16MT/DSSMELSEC-F Series FX3G-40MT/ES-AMELSEC-F Series FX3G-60MT/DSMELSEC-F Series FX3U-16MR/ES-AMELSEC-F Series FX3S-10MT/ESSMELSEC-F Series FX3U-80MT/ES-AMELSEC-F Series FX3S-30MR/ESMELSEC-F Series FX3S-30MT/ES-2ADMitsubishi Electric CNC E70 Series E70MELSEC iQ-F Series FX5UJ-40MR/DSMELSEC-F Series FX3G-24MR/DSMELSEC-F Series FX3U-64MT/ESSMELSEC-F Series FX3U-32MT/DSMELSEC-F Series FX3G-14MT/DSSMELSEC-F Series FX3G-40MT/DSSMELSEC iQ-R Series RD77GF32MELSEC-F Series FX3UC-64MT/DMELSEC iQ-R Series R32ENCPUMELSEC-F Series FX3U-16MT/DSSMELSEC-F Series FX3S-14MT/DSMELSEC Q Series Q170MSCPUMELSEC-F Series FX3G-60MR/ESMELSEC Q Series QD77MS16MELSEC iQ-R Series R08ENCPUMELSEC-F Series FX3GE-40MT/ESSMELSEC Q Series QD77MS4MELSEC iQ-F Series FX5UJ-24MR/ES-A
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
  • Previous
  • 1
  • 2
  • Next
Details not found