Vulnerabilities (CVE)

Filtered by CWE-287
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-16286 1 Hp 1 Thinpro Linux 2020-08-24 4.6 MEDIUM 6.8 MEDIUM
An attacker may be able to bypass the OS application filter meant to restrict applications that can be executed by changing browser preferences to launch a separate process that in turn can execute arbitrary commands.
CVE-2020-8685 1 Intel 1 Led Manager For Nuc 2020-08-19 2.1 LOW 4.4 MEDIUM
Improper authentication in subsystem for Intel (R) LED Manager for NUC before version 1.2.3 may allow privileged user to potentially enable denial of service via local access.
CVE-2020-9259 1 Huawei 2 Honor V30, Honor V30 Firmware 2020-07-22 4.3 MEDIUM 6.5 MEDIUM
Huawei Honor V30 smartphones with versions earlier than 10.1.0.212(C00E210R5P1) have an improper authentication vulnerability. The system does not sufficiently validate certain parameter passed from the bottom level, the attacker should trick the user into installing a malicious application and control the bottom level, successful exploit could cause information disclosure.
CVE-2020-3197 1 Cisco 1 Meeting Server 2020-07-22 5.0 MEDIUM 5.3 MEDIUM
A vulnerability in the API subsystem of Cisco Meetings App could allow an unauthenticated, remote attacker to retain and reuse the Traversal Using Relay NAT (TURN) server credentials that are configured in an affected system. The vulnerability is due to insufficient protection mechanisms for the TURN server credentials. An attacker could exploit this vulnerability by intercepting the legitimate traffic that is generated by an affected system. An exploit could allow the attacker to obtain the TURN server credentials, which the attacker could use to place audio/video calls and forward packets through the configured TURN server. The attacker would not be able to take control of the TURN server unless the same credentials were used in multiple systems.
CVE-2019-17023 2 Canonical, Mozilla 2 Ubuntu Linux, Firefox 2020-07-18 4.3 MEDIUM 6.5 MEDIUM
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
CVE-2020-14477 1 Philips 16 Affiniti 50, Affiniti 50 Firmware, Affiniti 70 and 13 more 2020-07-15 3.6 LOW 4.4 MEDIUM
In Philips Ultrasound ClearVue Versions 3.2 and prior, Ultrasound CX Versions 5.0.2 and prior, Ultrasound EPIQ/Affiniti Versions VM5.0 and prior, Ultrasound Sparq Version 3.0.2 and prior and Ultrasound Xperius all versions, an attacker may use an alternate path or channel that does not require authentication of the alternate service login to view or modify information.
CVE-2017-12610 1 Apache 1 Kafka 2020-07-15 4.9 MEDIUM 6.8 MEDIUM
In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations in Apache Kafka.
CVE-2020-1838 1 Huawei 2 Mate 30 Pro, Mate 30 Pro Firmware 2020-07-09 1.9 LOW 5.5 MEDIUM
HUAWEI Mate 30 Pro with versions earlier than 10.1.0.150(C00E136R5P3) have is an improper authentication vulnerability. The device does not sufficiently validate certain credential of user's face, an attacker could craft the credential of the user, successful exploit could allow the attacker to pass the authentication with the crafted credential.
CVE-2019-20412 1 Atlassian 2 Jira, Jira Software Data Center 2020-07-08 5.0 MEDIUM 5.3 MEDIUM
The Convert Sub-Task to Issue page in affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate the following information via an Improper Authentication vulnerability: Workflow names; Project Key, if it is part of the workflow name; Issue Keys; Issue Types; Status Types. The affected versions are before version 7.13.9, and from version 8.0.0 before 8.4.2.
CVE-2020-10278 4 Aliasrobotics, Enabled-robotics, Mobile-industrial-robotics and 1 more 20 Mir100, Mir1000, Mir1000 Firmware and 17 more 2020-07-06 5.0 MEDIUM 4.6 MEDIUM
The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a Live Image.
CVE-2016-11072 1 Mattermost 1 Mattermost Server 2020-06-26 6.4 MEDIUM 6.5 MEDIUM
An issue was discovered in Mattermost Server before 3.0.2. The purposes of a session ID and a Session Token were mishandled.
CVE-2017-18919 1 Mattermost 1 Mattermost Server 2020-06-25 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Mattermost Server before 3.7.0 and 3.6.3. Attackers can use the API for unauthenticated team creation.
CVE-2020-14455 1 Mattermost 1 Mattermost Desktop 2020-06-25 4.3 MEDIUM 6.5 MEDIUM
An issue was discovered in Mattermost Desktop App before 4.4.0. Prompting for HTTP Basic Authentication is mishandled, allowing phishing, aka MMSA-2020-0007.
CVE-2020-9076 1 Huawei 6 P30, P30 Firmware, P30 Pro and 3 more 2020-06-20 4.0 MEDIUM 6.8 MEDIUM
HUAWEI P30;HUAWEI P30 Pro;Tony-AL00B smartphones with versions earlier than 10.1.0.135(C00E135R2P11); versions earlier than 10.1.0.135(C00E135R2P8), versions earlier than 10.1.0.135 have an improper authentication vulnerability. Due to the identity of the message sender not being properly verified, an attacker can exploit this vulnerability through man-in-the-middle attack to induce user to access malicious URL.
CVE-2020-3216 1 Cisco 1 Ios Xe Sd-wan 2020-06-10 7.2 HIGH 6.8 MEDIUM
A vulnerability in Cisco IOS XE SD-WAN Software could allow an unauthenticated, physical attacker to bypass authentication and gain unrestricted access to the root shell of an affected device. The vulnerability exists because the affected software has insufficient authentication mechanisms for certain commands. An attacker could exploit this vulnerability by stopping the boot initialization of an affected device. A successful exploit could allow the attacker to bypass authentication and gain unrestricted access to the root shell of the affected device.
CVE-2020-1798 1 Huawei 2 P30, P30 Firmware 2020-05-29 2.1 LOW 4.6 MEDIUM
HUAWEI P30 smartphones with versions earlier than 10.1.0.135(C00E135R2P11) have an improper authentication vulnerability. A logic error occurs when handling NFC work, an attacker should establish a NFC connection to the target phone, and then do a series of operations on the target phone. Successful exploit could allow a guest user do certain operation which is beyond the guest user's privilege.
CVE-2020-5727 1 Simplisafe 2 Ss3, Ss3 Firmware 2020-05-07 2.1 LOW 4.6 MEDIUM
Authentication bypass using an alternate path or channel in SimpliSafe SS3 firmware 1.4 allows a local, unauthenticated attacker to pair a rogue keypad to an armed system.
CVE-2017-18862 1 Netgear 24 Gs105e, Gs105e Firmware, Gs105pe and 21 more 2020-05-05 3.3 LOW 6.5 MEDIUM
Certain NETGEAR devices are affected by authentication bypass. This affects JGS516PE before 2017-05-11, JGS524Ev2 before 2017-05-11, JGS524PE before 2017-05-11, GS105Ev2 before 2017-05-11, GS105PE before 2017-05-11, GS108Ev3 before 2017-05-11, GS108PEv3 before 2017-05-11, GS116Ev2 before 2017-05-11, GSS108E before 2017-05-11, GSS116E before 2017-05-11, XS708Ev2 before 2017-05-11, and XS716E before 2017-05-11.
CVE-2020-5563 1 Cybozu 1 Garoon 2020-04-30 5.0 MEDIUM 5.3 MEDIUM
Improper authentication vulnerability in Cybozu Garoon 4.0.0 to 4.10.3 allows remote attackers to obtain data in the affected product via the API.
CVE-2020-7276 1 Mcafee 1 Endpoint Security 2020-04-21 4.6 MEDIUM 6.7 MEDIUM
Authentication bypass vulnerability in MfeUpgradeTool in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 April 2020 Update allows administrator users to access policy settings via running this tool.
CVE-2020-1878 1 Huawei 2 Oxfords-an00a, Oxfords-an00a Firmware 2020-04-15 2.1 LOW 5.5 MEDIUM
Huawei smartphone OxfordS-AN00A with versions earlier than 10.0.1.152D(C735E152R3P3),versions earlier than 10.0.1.160(C00E160R4P1) have an improper authentication vulnerability. Authentication to target component is improper when device performs an operation. Attackers exploit this vulnerability to obtain some information by loading malicious application, leading to information leak.
CVE-2020-8148 1 Ui 2 Cloud Key Gen2, Cloud Key Gen2 Plus 2020-04-13 5.0 MEDIUM 5.3 MEDIUM
UniFi Cloud Key firmware < 1.1.6 contains a vulnerability that enables an attacker being able to change a device hostname by sending a malicious API request. This affects Cloud Key gen2 and Cloud Key gen2 Plus.
CVE-2018-21062 1 Google 1 Android 2020-04-09 2.1 LOW 4.6 MEDIUM
An issue was discovered on Samsung mobile devices with N(7.x) and O(8.x) software. When biometric authentication is disabled, an attacker can view Streams content (e.g., a Gallery slideshow) of a locked Secure Folder via a connection to an external device. The Samsung ID is SVE-2018-11766 (August 2018).
CVE-2017-18646 1 Google 1 Android 2020-04-09 2.1 LOW 4.6 MEDIUM
An issue was discovered on Samsung mobile devices with M(6.x) and N(7.x) software. An attacker can bypass the password requirement for tablet user switching by folding the magnetic cover. The Samsung ID is SVE-2017-10602 (December 2017).
CVE-2016-11041 1 Google 1 Android 2020-04-07 2.1 LOW 4.6 MEDIUM
An issue was discovered on Samsung mobile devices with KK(4.4) software. Attackers can bypass the lockscreen by sending an AT command over USB. The Samsung ID is SVE-2015-5301 (June 2016).
CVE-2020-10847 2 Google, Samsung 3 Android, Galaxy Note8, Galaxy S8 2020-03-30 4.6 MEDIUM 6.8 MEDIUM
An issue was discovered on Samsung mobile devices with P(9.0) (Galaxy S8 and Note8) software. Facial recognition can be spoofed. The Samsung ID is SVE-2019-16614 (February 2020).
CVE-2020-1793 1 Huawei 4 Mate 20, Mate 20 Firmware, Mate 30 Pro and 1 more 2020-03-25 2.1 LOW 4.6 MEDIUM
There is an improper authentication vulnerability in several smartphones. The applock does not perform a sufficient authentication in certain scenarios, successful exploit could allow the attacker to gain certain data of the application which is locked. Affected product versions include:HUAWEI Mate 20 versions Versions earlier than 10.0.0.188(C00E74R3P8);HUAWEI Mate 30 Pro versions Versions earlier than 10.0.0.203(C00E202R7P2).
CVE-2020-1794 1 Huawei 4 Mate 20, Mate 20 Firmware, Mate 30 Pro and 1 more 2020-03-24 2.1 LOW 4.6 MEDIUM
There is an improper authentication vulnerability in several smartphones. The applock does not perform a sufficient authentication in certain scenarios, successful exploit could allow the attacker to gain certain data of the application which is locked. Affected product versions include:HUAWEI Mate 20 versions Versions earlier than 10.0.0.188(C00E74R3P8);HUAWEI Mate 30 Pro versions Versions earlier than 10.0.0.203(C00E202R7P2).
CVE-2020-4205 1 Ibm 1 Datapower Gateway 2020-03-20 6.5 MEDIUM 6.3 MEDIUM
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.8 could allow an authenticated user to bypass security restrictions, and continue to access the server even after authentication certificates have been revolked. IBM X-Force ID: 174961.
CVE-2018-13060 1 Easyappointments 1 Easy\!appointments 2020-03-18 5.0 MEDIUM 6.5 MEDIUM
Easy!Appointments 1.3.0 has a Guessable CAPTCHA issue.
CVE-2020-9064 1 Huawei 2 Honor V30, Honor V30 Firmware 2020-03-18 2.1 LOW 5.5 MEDIUM
Huawei smartphone Honor V30 with versions earlier than OxfordS-AN00A 10.0.1.167(C00E166R4P1) have an improper authentication vulnerability. Authentication to target component is improper when device performs an operation. Attackers exploit this vulnerability to obtain some information by loading malicious application, leading to information leak.
CVE-2019-3998 1 Simplisafe 2 Simplisafe Ss3, Simplisafe Ss3 Firmware 2020-02-25 1.9 LOW 5.5 MEDIUM
Authentication bypass using an alternate path or channel in SimpliSafe SS3 firmware 1.4 allows a local, unauthenticated attacker to modify the Wi-Fi network the base station connects to.
CVE-2020-5532 1 Extrun 1 Ilbo 2020-02-25 4.0 MEDIUM 4.3 MEDIUM
ilbo App (ilbo App for Android prior to version 1.1.8 and ilbo App for iOS prior to version 1.2.01) allows an attacker on the same network segment to bypass authentication and to view the images which were recorded by the other ilbo user's device via unspecified vectors.
CVE-2020-1789 1 Huawei 8 Osca-550, Osca-550 Firmware, Osca-550a and 5 more 2020-02-20 4.6 MEDIUM 6.8 MEDIUM
Huawei OSCA-550, OSCA-550A, OSCA-550AX, and OSCA-550X products with version 1.0.1.21(SP3) have an insufficient authentication vulnerability. The software does not require a strong credential when the user trying to do certain operations. Successful exploit could allow an attacker to pass the authentication and do certain operations by a weak credential.
CVE-2020-1842 1 Huawei 10 Hege-560, Hege-560 Firmware, Osca-550 and 7 more 2020-02-20 4.6 MEDIUM 6.8 MEDIUM
Huawei HEGE-560 version 1.0.1.20(SP2); OSCA-550 and OSCA-550A version 1.0.0.71(SP1); and OSCA-550AX and OSCA-550X version 1.0.0.71(SP2) have an insufficient authentication vulnerability. An attacker can access the device physically and perform specific operations to exploit this vulnerability. Successful exploitation may cause the attacker obtain high privilege.
CVE-2019-15615 1 Nextcloud 1 Nextcloud 2020-02-13 3.6 LOW 6.1 MEDIUM
A wrong check for the system time in the Android App 3.9.0 causes a bypass of the lock protection when changing the time of the system to the past.
CVE-2012-6340 1 Netgear 4 Wgr614v7, Wgr614v7 Firmware, Wgr614v9 and 1 more 2020-02-11 2.1 LOW 4.6 MEDIUM
An Authentication vulnerability exists in NETGEAR WGR614 v7 and v9 due to a hardcoded credential used for serial programming, a related issue to CVE-2006-1002.
CVE-2013-3096 1 Dlink 2 Dir865l, Dir865l Firmware 2020-02-10 4.3 MEDIUM 5.9 MEDIUM
D-Link DIR865L v1.03 suffers from an "Unauthenticated Hardware Linking" vulnerability.
CVE-2013-5112 1 Evernote 1 Evernote 2020-02-10 2.1 LOW 4.6 MEDIUM
Evernote before 5.5.1 has insecure PIN storage
CVE-2013-1600 1 Dlink 4 Dcs-2102, Dcs-2102 Firmware, Dcs-2121 and 1 more 2020-02-04 5.0 MEDIUM 5.3 MEDIUM
An Authentication Bypass vulnerability exists in upnp/asf-mp4.asf when streaming live video in D-Link TESCO DCS-2121 1.05_TESCO, TESCO DCS-2102 1.05_TESCO, DCS-2121 1.06_FR, 1.06, and 1.05_RU, DCS-2102 1.06_FR. 1.06, and 1.05_RU, which could let a malicious user obtain sensitive information.
CVE-2013-5114 1 Logmein 1 Lastpass 2020-02-03 6.6 MEDIUM 6.1 MEDIUM
LastPass prior to 2.5.1 allows secure wipe bypass.
CVE-2013-1596 1 Vivotek 2 Pt7135, Pt7135 Firmware 2020-01-31 5.0 MEDIUM 5.3 MEDIUM
An Authentication Bypass Vulnerability exists in Vivotek PT7135 IP Camera 0300a and 0400a via specially crafted RTSP packets to TCP port 554.
CVE-2020-1787 1 Huawei 2 Mate 20, Mate 20 Firmware 2020-01-29 7.2 HIGH 6.6 MEDIUM
HUAWEI Mate 20 smartphones versions earlier than 9.1.0.139(C00E133R3P1) have an improper authentication vulnerability. The system has a logic error under certain scenario, successful exploit could allow the attacker who gains the privilege of guest user to access to the host user's desktop in an instant, without unlocking the screen lock of the host user.
CVE-2020-1840 1 Huawei 2 Mate 20, Mate 20 Firmware 2020-01-29 3.6 LOW 6.0 MEDIUM
HUAWEI Mate 20 smart phones with versions earlier than 10.0.0.175(C00E70R3P8) have an insufficient authentication vulnerability. A local attacker with high privilege can execute a specific command to exploit this vulnerability. Successful exploitation may cause information leak and compromise the availability of the smart phones.Affected product versions include: HUAWEI Mate 20 versions Versions earlier than 10.0.0.175(C00E70R3P8)
CVE-2020-7222 1 Amcrest 1 Web Server 2020-01-29 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Amcrest Web Server 2.520.AC00.18.R 2017-06-29 WEB 3.2.1.453504. The login page responds with JavaScript when one tries to authenticate. An attacker who changes the result parameter (to true) in this JavaScript code can bypass authentication and achieve limited privileges (ability to see every option but not modify them).
CVE-2020-1788 1 Huawei 2 Honor V30, Honor V30 Firmware 2020-01-24 4.3 MEDIUM 5.5 MEDIUM
Honor V30 smartphones with versions earlier than 10.0.1.135(C00E130R4P1) have an improper authentication vulnerability. Certain applications do not properly validate the identity of another application who would call its interface. An attacker could trick the user into installing a malicious application. Successful exploit could allow unauthorized actions leading to information disclosure.
CVE-2012-1258 1 Plixer 1 Scrutinizer Netflow \& Sflow Analyzer 2020-01-22 4.0 MEDIUM 6.5 MEDIUM
cgi-bin/userprefs.cgi in Plixer International Scrutinizer NetFlow & sFlow Analyzer before 9.0.1.19899 does not validate user permissions, which allow remote attackers to add user accounts with administrator privileges via the newuser, pwd, and selectedUserGroup parameters.
CVE-2017-7562 2 Mit, Redhat 5 Kerberos 5, Enterprise Linux, Enterprise Linux Desktop and 2 more 2020-01-21 4.0 MEDIUM 6.5 MEDIUM
An authentication bypass flaw was found in the way krb5's certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary principals under rare and erroneous circumstances.
CVE-2020-1786 1 Huawei 2 Mate 20 Pro, Mate 20 Pro Firmware 2020-01-15 2.1 LOW 4.6 MEDIUM
HUAWEI Mate 20 Pro smartphones versions earlier than 10.0.0.175(C00E69R3P8) have an improper authentication vulnerability. The software does not sufficiently validate the name of apk file in a special condition which could allow an attacker to forge a crafted application as a normal one. Successful exploit could allow the attacker to bypass digital balance function.
CVE-2018-20489 1 Gitlab 1 Gitlab 2020-01-08 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control.