Vulnerabilities (CVE)

Filtered by CWE-287
Total 3293 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-2302 1 Lenze 6 C520, C520 Firmware, C550 and 3 more 2022-07-18 9.3 HIGH 9.8 CRITICAL
Multiple Lenze products of the cabinet series skip the password verification upon second login. After a user has been logged on to the device once, a remote attacker can get full access without knowledge of the password.
CVE-2022-2133 1 Miniorange 1 Oauth Single Sign On 2022-07-18 5.0 MEDIUM 5.3 MEDIUM
The OAuth Single Sign On WordPress plugin before 6.22.6 doesn't validate that OAuth access token requests are legitimate, which allows attackers to log onto the site with the only knowledge of a user's email address.
CVE-2022-30755 1 Google 1 Android 2022-07-16 4.6 MEDIUM 7.8 HIGH
Improper authentication vulnerability in AppLock prior to SMR Jul-2022 Release 1 allows attacker to bypass password confirm activity by hijacking the implicit intent.
CVE-2015-5298 1 Jenkins 1 Google Login 2022-07-15 4.0 MEDIUM 6.5 MEDIUM
The Google Login Plugin (versions 1.0 and 1.1) allows malicious anonymous users to authenticate successfully against Jenkins instances that are supposed to be locked down to a particular Google Apps domain through client-side request modification.
CVE-2021-41995 2 Apple, Pingidentity 2 Macos, Pingid Integration For Mac Login 2022-07-15 5.0 MEDIUM 7.5 HIGH
A misconfiguration of RSA in PingID Mac Login prior to 1.1 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass.
CVE-2022-2197 1 Exemys 2 Rme1, Rme1 Firmware 2022-07-13 10.0 HIGH 9.8 CRITICAL
By using a specific credential string, an attacker with network access to the device’s web interface could circumvent the authentication scheme and perform administrative operations.
CVE-2021-0595 1 Google 1 Android 2022-07-12 4.6 MEDIUM 7.8 HIGH
In lockAllProfileTasks of RootWindowContainer.java, there is a possible way to access the work profile without the profile PIN, after logging in. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-177457096
CVE-2021-29012 1 Dmasoftlab 1 Dma Radius Manager 2022-07-12 7.5 HIGH 9.8 CRITICAL
DMA Softlab Radius Manager 4.4.0 assigns the same session cookie to every admin session. The cookie is valid when the admin is logged in, but is invalid (temporarily) during times when the admin is logged out. In other words, the cookie is functionally equivalent to a static password, and thus provides permanent access if stolen.
CVE-2021-35943 1 Couchbase 1 Couchbase Server 2022-07-12 7.5 HIGH 9.8 CRITICAL
Couchbase Server 6.5.x and 6.6.x through 6.6.2 has Incorrect Access Control. Externally managed users are not prevented from using an empty password, per RFC4513.
CVE-2021-45379 1 Glewlwyd Project 1 Glewlwyd 2022-07-12 6.5 MEDIUM 8.8 HIGH
Glewlwyd 2.0.0, fixed in 2.6.1 is affected by an incorrect access control vulnerability. One user can attempt to log in as another user without its password.
CVE-2021-31326 1 Dlink 2 Dir-816, Dir-816 Firmware 2022-07-12 9.0 HIGH 9.8 CRITICAL
D-Link DIR-816 A2 1.10 B05 allows unauthenticated attackers to arbitrarily reset the device via a crafted tokenid parameter to /goform/form2Reboot.cgi.
CVE-2020-16839 1 Crestron 6 Dm-nvx-dir-160, Dm-nvx-dir-160 Firmware, Dm-nvx-dir-80 and 3 more 2022-07-12 5.0 MEDIUM 7.5 HIGH
On Crestron DM-NVX-DIR, DM-NVX-DIR80, and DM-NVX-ENT devices before the DM-XIO/1-0-3-802 patch, the password can be changed by sending an unauthenticated WebSocket request.
CVE-2021-42837 1 Talend 1 Data Catalog 2022-07-12 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Talend Data Catalog before 7.3-20210930. After setting up SAML/OAuth, authentication is not correctly enforced on the native login page. Any valid user from the SAML/OAuth provider can be used as the username with an arbitrary password, and login will succeed.
CVE-2021-21502 1 Dell 1 Emc Powerscale Onefs 2022-07-12 7.5 HIGH 9.8 CRITICAL
Dell PowerScale OneFS versions 8.1.0 – 9.1.0 contain a "use of SSH key past account expiration" vulnerability. A user on the network with the ISI_PRIV_AUTH_SSH RBAC privilege that has an expired account may potentially exploit this vulnerability, giving them access to the same things they had before account expiration. This may by a high privileged account and hence Dell recommends customers upgrade at the earliest opportunity.
CVE-2021-37417 1 Zohocorp 1 Manageengine Adselfservice Plus 2022-07-12 5.0 MEDIUM 9.8 CRITICAL
Zoho ManageEngine ADSelfService Plus version 6103 and prior allows CAPTCHA bypass due to improper parameter validation.
CVE-2021-20168 1 Netgear 2 Rax43, Rax43 Firmware 2022-07-12 7.2 HIGH 6.8 MEDIUM
Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin.
CVE-2021-3153 1 Hashicorp 1 Terraform Enterprise 2022-07-12 4.0 MEDIUM 6.5 MEDIUM
HashiCorp Terraform Enterprise up to v202102-2 failed to enforce an organization-level setting that required users within an organization to have two-factor authentication enabled. Fixed in v202103-1.
CVE-2020-26557 1 Bluetooth 1 Mesh Profile 2022-07-12 2.9 LOW 7.5 HIGH
Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (without possession of the AuthValue used in the provisioning protocol) to determine the AuthValue via a brute-force attack (unless the AuthValue is sufficiently random and changed each time).
CVE-2021-31602 1 Hitachi 2 Vantara Pentaho, Vantara Pentaho Business Intelligence Server 2022-07-12 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.
CVE-2021-20092 1 Buffalo 4 Wsr-2533dhp3-bk, Wsr-2533dhp3-bk Firmware, Wsr-2533dhpl2-bk and 1 more 2022-07-12 5.0 MEDIUM 7.5 HIGH
The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly restrict access to sensitive information from an unauthorized actor.