Vulnerabilities (CVE)

Filtered by CWE-287
Total 3293 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-1443 1 Ibm 2 Security Access Manager, Tivoli Federated Identity Manager 2019-10-09 4.6 MEDIUM 5.9 MEDIUM
An XML parsing vulnerability affects IBM SAML-based single sign-on (SSO) systems (IBM Security Access Manager 9.0.0 - 9.0.4 and IBM Tivoli Federated Identity Manager 6.2 - 6.0.2.) This vulnerability can allow an attacker with authenticated access to trick SAML systems into authenticating as a different user without knowledge of the victim users password. IBM X-Force ID: 139754.
CVE-2018-1638 1 Ibm 1 Api Connect 2019-10-09 6.8 MEDIUM 8.1 HIGH
IBM API Connect 5.0.0.0-5.0.8.3 Developer Portal does not enforce Two Factor Authentication (TFA) while resetting a user password but enforces it for all other login scenarios. IBM X-Force ID: 144483.
CVE-2018-1672 1 Ibm 1 Websphere Portal 2019-10-09 6.5 MEDIUM 6.3 MEDIUM
IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 may fail to set the correct user context in certain impersonation scenarios, which can allow a user to act with the identity of a different user. IBM X-Force ID: 144958.
CVE-2018-1738 1 Ibm 1 Security Key Lifecycle Manager 2019-10-09 5.5 MEDIUM 7.1 HIGH
IBM Security Key Lifecycle Manager 2.6, 2.7, 3.0 could allow an authenticated user to obtain highly sensitive information or jeopardize system integrity due to improper authentication mechanisms. IBM X-Force ID: 147907.
CVE-2018-1106 4 Canonical, Debian, Packagekit Project and 1 more 9 Ubuntu Linux, Debian Linux, Packagekit and 6 more 2019-10-09 2.1 LOW 5.5 MEDIUM
An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system.
CVE-2018-18814 1 Tibco 2 Spotfire Analytics Platform For Aws, Spotfire Server 2019-10-09 7.5 HIGH 9.8 CRITICAL
The TIBCO Spotfire authentication component of TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace, and TIBCO Spotfire Server contains a vulnerability in the handling of the authentication that theoretically may allow an attacker to gain full access to a target account, independent of configured authentication mechanisms. Affected releases are TIBCO Software Inc. TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 10.0.0, and TIBCO Spotfire Server: versions up to and including 7.10.1; 7.11.0; 7.11.1; 7.12.0; 7.13.0; 7.14.0.
CVE-2018-17918 1 Circontrol 2 Circarlife, Circarlife Firmware 2019-10-09 7.5 HIGH 9.8 CRITICAL
Circontrol CirCarLife all versions prior to 4.3.1, authentication to the device can be bypassed by entering the URL of a specific page.
CVE-2018-19023 1 Hetronic 10 Bms-hl, Bms-hl Firmware, Dc Mobile and 7 more 2019-10-09 5.8 MEDIUM 8.8 HIGH
Hetronic Nova-M prior to verson r161 uses fixed codes that are reproducible by sniffing and re-transmission. This can lead to unauthorized replay of a command, spoofing of an arbitrary message, or keeping the controlled load in a permanent "stop" state.
CVE-2018-17923 1 Sagaradio 2 Saga1-l8b, Saga1-l8b Firmware 2019-10-09 6.9 MEDIUM 6.9 MEDIUM
SAGA1-L8B with any firmware versions prior to A0.10 are vulnerable to an attack that an attacker with physical access to the product may able to reprogram it.
CVE-2018-17928 1 Abb 2 Cms-770, Cms-770 Firmware 2019-10-09 3.3 LOW 6.5 MEDIUM
The product CMS-770 (Software Versions 1.7.1 and prior)is vulnerable that an attacker can read sensitive configuration files by bypassing the user authentication mechanism.
CVE-2018-17926 1 Abb 3 Eth-fw Firmware, Fw Firmware, M2m Ethernet 2019-10-09 3.3 LOW 4.3 MEDIUM
The product M2M ETHERNET (FW Versions 2.22 and prior, ETH-FW Versions 1.01 and prior) is vulnerable in that an attacker can upload a malicious language file by bypassing the user authentication mechanism.
CVE-2018-19000 1 Lcds 1 Laquis Scada 2019-10-09 5.0 MEDIUM 5.3 MEDIUM
LCDS Laquis SCADA prior to version 4.1.0.4150 allows an authentication bypass, which may allow an attacker access to sensitive data.
CVE-2018-16464 1 Nextcloud 1 Nextcloud Server 2019-10-09 3.5 LOW 5.7 MEDIUM
A missing access check in Nextcloud Server prior to 14.0.0 could lead to continued access to password protected link shares when the owner had changed the password.
CVE-2018-16465 1 Nextcloud 1 Nextcloud Server 2019-10-09 4.3 MEDIUM 5.3 MEDIUM
Missing state in Nextcloud Server prior to 14.0.0 would not enforce the use of a second factor at login if the the provider of the second factor failed to load.
CVE-2018-16467 1 Nextcloud 1 Nextcloud Server 2019-10-09 5.0 MEDIUM 5.3 MEDIUM
A missing check in Nextcloud Server prior to 14.0.0 could give unauthorized access to the previews of single file password protected shares.
CVE-2018-14637 1 Redhat 1 Keycloak 2019-10-09 6.8 MEDIUM 8.1 HIGH
The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack.
CVE-2018-15721 1 Logitech 2 Harmony Hub, Harmony Hub Firmware 2019-10-09 7.5 HIGH 9.8 CRITICAL
The XMPP server in Logitech Harmony Hub before version 4.15.206 is vulnerable to authentication bypass via a crafted XMPP request. Remote attackers can use this vulnerability to gain access to the local API.
CVE-2018-14782 1 Netcommwireless 2 Nwl-25, Nwl-25 Firmware 2019-10-09 5.0 MEDIUM 7.5 HIGH
NetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. The device allows access to configuration files and profiles without authenticating the user.
CVE-2018-15371 1 Cisco 1 Ios Xe 2019-10-09 7.2 HIGH 6.7 MEDIUM
A vulnerability in the shell access request mechanism of Cisco IOS XE Software could allow an authenticated, local attacker to bypass authentication and gain unrestricted access to the root shell of an affected device. The vulnerability exists because the affected software has insufficient authentication mechanisms for certain commands. An attacker could exploit this vulnerability by requesting access to the root shell of an affected device, after the shell access feature has been enabled. A successful exploit could allow the attacker to bypass authentication and gain unrestricted access to the root shell of the affected device.
CVE-2018-15556 1 Actiontec 2 Web6000q, Web6000q Firmware 2019-10-09 10.0 HIGH 9.8 CRITICAL
The Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 allows login with root level access with the user "root" and an empty password by using the enabled onboard UART headers.