Vulnerabilities (CVE)

Filtered by CWE-287
Total 3293 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-27734 1 Belden 2 Hirschmann Hios, Hisecos 2022-07-12 7.5 HIGH 9.8 CRITICAL
Hirschmann HiOS 07.1.01, 07.1.02, and 08.1.00 through 08.5.xx and HiSecOS 03.3.00 through 03.5.01 allow remote attackers to change the credentials of existing users.
CVE-2021-26905 1 1password 1 Scim Bridge 2022-07-12 4.0 MEDIUM 6.5 MEDIUM
1Password SCIM Bridge before 1.6.2 mishandles validation of authenticated requests for log files, leading to disclosure of a TLS private key.
CVE-2021-38376 1 Open-xchange 1 Ox App Suite 2022-07-12 5.0 MEDIUM 5.3 MEDIUM
OX App Suite through 7.10.5 has Incorrect Access Control for retrieval of session information via the rampup action of the login API call.
CVE-2021-20161 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2022-07-12 7.2 HIGH 6.8 MEDIUM
Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient protections for the UART functionality. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection. No username or password is required and the user is given a root shell with full control of the device.
CVE-2021-44937 1 Glfusion 1 Glfusion 2022-07-12 5.0 MEDIUM 5.3 MEDIUM
glFusion CMS v1.7.9 is affected by an arbitrary user registration vulnerability in /public_html/users.php. An attacker can register with the mailbox of any user. When users want to register, they will find that the mailbox has been occupied.
CVE-2021-3332 1 Wpserveur 1 Wps Hide Login 2022-07-12 5.0 MEDIUM 5.3 MEDIUM
WPS Hide Login 1.6.1 allows remote attackers to bypass a protection mechanism via post_password.
CVE-2021-38299 1 Spomky-labs 1 Webauthn Framwork 2022-07-12 7.5 HIGH 9.8 CRITICAL
Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence.
CVE-2022-1955 1 Opft 1 Session 2022-07-11 2.1 LOW 4.6 MEDIUM
Session 1.13.0 allows an attacker with physical access to the victim's device to bypass the application's password/pin lock to access user data. This is possible due to lack of adequate security controls to prevent dynamic code manipulation.
CVE-2022-31463 1 Owllabs 2 Meeting Owl Pro, Meeting Owl Pro Firmware 2022-07-08 4.3 MEDIUM 7.1 HIGH
Owl Labs Meeting Owl 5.2.0.15 does not require a password for Bluetooth commands, because only client-side authentication is used.
CVE-2022-29858 1 Silverstripe 1 Assets 2022-07-08 4.0 MEDIUM 4.3 MEDIUM
Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content.
CVE-2022-33202 1 Softcreate 1 L2blocker 2022-07-07 4.8 MEDIUM 8.1 HIGH
Authentication bypass vulnerability in the setup screen of L2Blocker(on-premise) Ver4.8.5 and earlier and L2Blocker(Cloud) Ver4.8.5 and earlier allows an adjacent attacker to perform an unauthorized login and obtain the stored information or cause a malfunction of the device by using alternative paths or channels for Sensor.
CVE-2022-29578 1 Meridian 1 Meridian 2022-07-06 5.0 MEDIUM 5.3 MEDIUM
Meridian Cooperative Utility Software versions 22.02 and 22.03 allows remote attackers to obtain sensitive information such as name, address, and daily energy usage.
CVE-2021-32691 1 Apollosapp 1 Data-connector-rock 2022-07-02 7.5 HIGH 9.8 CRITICAL
Apollos Apps is an open source platform for launching church-related apps. In Apollos Apps versions prior to 2.20.0, new user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events). There is a patch in version 2.20.0. As a workaround, one can patch one's server by overriding the `create` data source method on the `People` class.
CVE-2021-32967 1 Deltaww 1 Diaenergie 2022-07-02 10.0 HIGH 9.8 CRITICAL
Delta Electronics DIAEnergie Version 1.7.5 and prior may allow an attacker to add a new administrative user without being authenticated or authorized, which may allow the attacker to log in and use the device with administrative privileges.
CVE-2021-37172 1 Siemens 10 Cpu 1211c, Cpu 1212c, Cpu 1212fc and 7 more 2022-07-01 5.0 MEDIUM 7.5 HIGH
A vulnerability has been identified in SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (V4.5.0). Affected devices fail to authenticate against configured passwords when provisioned using TIA Portal V13. This could allow an attacker using TIA Portal V13 or later versions to bypass authentication and download arbitrary programs to the PLC. The vulnerability does not occur when TIA Portal V13 SP1 or any later version was used to provision the device.
CVE-2021-41638 1 Melag 1 Ftp Server 2022-07-01 5.0 MEDIUM 7.5 HIGH
The authentication checks of the MELAG FTP Server in version 2.2.0.4 are incomplete, which allows a remote attacker to access local files only by using a valid username.
CVE-2020-25251 1 Hyland 1 Onbase 2022-06-30 6.4 MEDIUM 9.1 CRITICAL
An issue was discovered in Hyland OnBase 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. Client-side authentication is used for critical functions such as adding users or retrieving sensitive information.
CVE-2021-26638 1 Xisnd 1 S\&d Smarthome 2022-06-30 10.0 HIGH 9.8 CRITICAL
Improper Authentication vulnerability in S&D smarthome(smartcare) application can cause authentication bypass and information exposure. Remote attackers can use this vulerability to take control of the home environment including indoor control.
CVE-2018-25043 1 Bittorrent 1 Utorrent 2022-06-29 6.8 MEDIUM 8.8 HIGH
A vulnerability classified as critical was found in uTorrent. This vulnerability affects unknown code of the component PRNG. The manipulation leads to weak authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
CVE-2022-29775 1 Ispyconnect 1 Ispy 2022-06-28 7.5 HIGH 9.8 CRITICAL
iSpyConnect iSpy v7.2.2.0 allows attackers to bypass authentication via a crafted URL.