Vulnerabilities (CVE)

Filtered by CWE-306
Total 1252 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-14984 1 Eq-3 4 Homematic Ccu2, Homematic Ccu2 Firmware, Homematic Ccu3 and 1 more 2020-08-24 6.8 MEDIUM 8.1 HIGH
eQ-3 Homematic CCU2 and CCU3 with the XML-API through 1.2.0 AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because the undocumented addons/xmlapi/exec.cgi script uses CMD_EXEC to execute TCL code from a POST request.
CVE-2019-20595 1 Google 1 Android 2020-08-24 2.1 LOW 2.4 LOW
An issue was discovered on Samsung mobile devices with P(9.0) software. Quick Panel allows enabling or disabling the Bluetooth stack without authentication. The Samsung ID is SVE-2019-14545 (July 2019).
CVE-2019-11061 1 Asus 2 Hg100, Hg100 Firmware 2020-08-24 4.8 MEDIUM 8.1 HIGH
A broken access control vulnerability in HG100 firmware versions up to 4.00.06 allows an attacker in the same local area network to control IoT devices that connect with itself via http://[target]/smarthome/devicecontrol without any authentication. CVSS 3.0 base score 10 (Confidentiality, Integrity and Availability impacts). CVSS vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
CVE-2019-15819 1 Restaurant Reservations Project 1 Restaurant Reservations 2020-08-24 7.5 HIGH 9.8 CRITICAL
The nd-restaurant-reservations plugin before 1.5 for WordPress has no requirement for nd_rst_import_settings_php_function authentication.
CVE-2019-12174 1 Hide 1 Hide.me 2020-08-24 7.2 HIGH 7.8 HIGH
hide.me before 2.4.4 on macOS suffers from a privilege escalation vulnerability in the connectWithExecutablePath:configFilePath:configFileName method of the me_hide_vpnhelper.Helper class in the me.hide.vpnhelper macOS privilege helper tool. This method takes user-supplied input and can be used to escalate privileges, as well as obtain the ability to run any application on the system in the root context.
CVE-2018-6223 1 Trendmicro 1 Email Encryption Gateway 2020-08-24 5.0 MEDIUM 9.8 CRITICAL
A missing authentication for appliance registration vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to manipulate the registration process of the product to reset configuration parameters.
CVE-2019-7389 1 Dlink 2 Dir-823g, Dir-823g Firmware 2020-08-24 7.8 HIGH 7.5 HIGH
An issue was discovered in /bin/goahead on D-Link DIR-823G devices with the firmware 1.02B03. There is incorrect access control allowing remote attackers to reset the router without authentication via the SetFactoryDefault HNAP API. Consequently, an attacker can achieve a denial-of-service attack without authentication.
CVE-2019-12128 1 Onap 1 Open Network Automation Platform 2020-08-24 10.0 HIGH 9.8 CRITICAL
In ONAP SO through Dublin, by accessing an applicable port (30234, 30290, 32010, 30270, 30224, 30281, 30254, 30285, and/or 30271), an attacker gains full access to the respective ONAP services without any authentication. All ONAP Operations Manager (OOM) setups are affected.
CVE-2019-7727 1 Nice 1 Engage 2020-08-24 7.5 HIGH 9.8 CRITICAL
In NICE Engage through 6.5, the default configuration binds an unauthenticated JMX/RMI interface to all network interfaces, without restricting registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol by using the JMX connector. The observed affected TCP port is 6338 but, based on the product's configuration, a different one could be vulnerable.
CVE-2019-11523 1 Anviz 2 M3, M3 Firmware 2020-08-24 7.5 HIGH 9.8 CRITICAL
Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).
CVE-2019-12506 1 Logitech 2 R700 Laser Presentation Remote, R700 Laser Presentation Remote Firmware 2020-08-24 8.3 HIGH 8.8 HIGH
Due to unencrypted and unauthenticated data communication, the wireless presenter Logitech R700 Laser Presentation Remote R-R0010 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device.
CVE-2019-9935 1 Lexmark 50 Cs31x, Cs31x Firmware, Cs41x and 47 more 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
Various Lexmark products have Incorrect Access Control (issue 2 of 2).
CVE-2019-11496 1 Couchbase 1 Couchbase Server 2020-08-24 6.4 MEDIUM 9.1 CRITICAL
In versions of Couchbase Server prior to 5.0, the bucket named "default" was a special bucket that allowed read and write access without authentication. As part of 5.0, the behavior of all buckets including "default" were changed to only allow access by authenticated users with sufficient authorization. However, users were allowed unauthenticated and unauthorized access to the "default" bucket if the properties of this bucket were edited. This has been fixed in versions 5.1.0 and 5.5.0.
CVE-2019-13344 1 Crudlab 1 Wp Like Button 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
An authentication bypass vulnerability in the CRUDLab WP Like Button plugin through 1.6.0 for WordPress allows unauthenticated attackers to change settings. The contains() function in wp_like_button.php did not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update settings, as demonstrated by the wp-admin/admin.php?page=facebook-like-button each_page_url or code_snippet parameter.
CVE-2018-1757 1 Ibm 1 Security Identity Governance And Intelligence 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
IBM Security Identity Governance and Intelligence 5.2.3.2 and 5.2.4 could allow an attacker to obtain sensitive information due to missing authentication in IGI for the survey application. IBM X-Force ID: 148601.
CVE-2019-20532 1 Google 1 Android 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. Attackers can access the Developer options without authentication. The Samsung ID is SVE-2019-15800 (December 2019).
CVE-2019-9585 1 Eq-3 4 Homematic Ccu2, Homematic Ccu2 Firmware, Homematic Ccu3 and 1 more 2020-08-24 7.5 HIGH 9.8 CRITICAL
eQ-3 Homematic CCU2 prior to 2.47.10 and CCU3 prior to 3.47.10 JSON API has Improper Access Control for Interface.***Metadata related operations, resulting in the ability to read, set and deletion of Metadata.
CVE-2019-10046 1 Pydio 1 Pydio 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
An unauthenticated attacker can obtain information about the Pydio 8.2.2 configuration including session timeout, libraries, and license information.
CVE-2019-10668 1 Librenms 1 Librenms 2020-08-24 6.4 MEDIUM 9.1 CRITICAL
An issue was discovered in LibreNMS through 1.47. A number of scripts import the Authentication libraries, but do not enforce an actual authentication check. Several of these scripts disclose information or expose functions that are of a sensitive nature and are not expected to be publicly accessible.
CVE-2019-12392 1 Anviz 1 Anviz Firmware 2020-08-24 7.5 HIGH 9.8 CRITICAL
Anviz access control devices allow remote attackers to issue commands without a password.