Vulnerabilities (CVE)

Filtered by CWE-287
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-7949 1 Huawei 40 1288h V5, 1288h V5 Firmware, 2288h V5 and 37 more 2018-07-05 4.0 MEDIUM 8.8 HIGH
The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a privilege escalation vulnerability. A remote attacker may send some specially crafted login messages to the affected products. Due to improper authentication design, successful exploit enables low privileged users to get or modify passwords of highly privileged users.
CVE-2016-10525 1 Dwyl 1 Hapi-auth-jwt2 2018-07-02 7.5 HIGH 9.8 CRITICAL
When attempting to allow authentication mode `try` in hapi, hapi-auth-jwt2 version 5.1.1 introduced an issue whereby people could bypass authentication.
CVE-2018-8898 1 D-link 2 Dsl-3782, Dsl-3782 Firmware 2018-07-02 7.5 HIGH 9.8 CRITICAL
A flaw in the authentication mechanism in the Login Panel of router D-Link DSL-3782 (A1_WI_20170303 || SWVer="V100R001B012" FWVer="3.10.0.24" FirmVer="TT_77616E6771696F6E67") allows unauthenticated attackers to perform arbitrary modification (read, write) to passwords and configurations meanwhile an administrator is logged into the web panel.
CVE-2017-9421 1 Accellion 1 Kiteworks 2018-06-27 6.4 MEDIUM 6.5 MEDIUM
Authentication Bypass vulnerability in Accellion kiteworks before 2017.01.00 allows remote attackers to execute certain API calls on behalf of a web user using a gathered token via a POST request to /oauth/token.
CVE-2018-10682 1 Wildfly 1 Wildfly 2018-06-18 10.0 HIGH 9.8 CRITICAL
** DISPUTED ** An issue was discovered in WildFly 10.1.2.Final. It is possible for an attacker to access the administration panel on TCP port 9990 without any authentication using "anonymous" access that is automatically created. Once logged in, a misconfiguration present by default (auto-deployment) permits an anonymous user to deploy a malicious .war file, leading to remote code execution. NOTE: the vendor indicates that anonymous access is not available in the default installation; however, it remains optional because there are several use cases for it, including development environments and network architectures that have a proxy server for access control to the WildFly server.
CVE-2018-7941 1 Huawei 40 1288h V5, 1288h V5 Firmware, 2288h V5 and 37 more 2018-06-14 6.5 MEDIUM 8.8 HIGH
Huawei iBMC V200R002C60 have an authentication bypass vulnerability. A remote attacker with low privilege may craft specific messages to upload authentication certificate to the affected products. Due to improper validation of the upload authority, successful exploit may cause privilege elevation.
CVE-2017-3775 1 Lenovo 22 Flex System X240 M5, Flex System X240 M5 Bios, Flex System X280 X6 and 19 more 2018-06-13 6.9 MEDIUM 6.4 MEDIUM
Some Lenovo System x server BIOS/UEFI versions, when Secure Boot mode is enabled by a system administrator, do not properly authenticate signed code before booting it. As a result, an attacker with physical access to the system could boot unsigned code.
CVE-2018-6020 1 Silextechnology 8 Geh-500, Geh-500 Firmware, Geh-sd-320an and 5 more 2018-06-13 6.4 MEDIUM 6.5 MEDIUM
In Silex SX-500 all versions and GE MobileLink(GEH-500) version 1.54 and prior, authentication is not verified when making certain POST requests, which may allow attackers to modify system settings.
CVE-2018-10544 1 Meross 2 Mss110, Mss110 Firmware 2018-06-13 5.0 MEDIUM 9.8 CRITICAL
Meross MSS110 devices through 1.1.24 contain an unauthenticated admin.htm administrative interface.
CVE-2018-9232 1 Twsz 2 Be126, Be126 Firmware 2018-06-13 9.3 HIGH 7.8 HIGH
Due to the lack of firmware authentication in the upgrade process of T&W WIFI Repeater BE126 devices, an attacker can craft a malicious firmware and use it as an update.
CVE-2018-7940 1 Huawei 4 Mate 9, Mate 9 Firmware, Mate 9 Pro and 1 more 2018-06-13 7.2 HIGH 6.2 MEDIUM
Huawei smart phones Mate 10 and Mate 10 Pro with earlier versions than 8.0.0.129(SP2C00) and earlier versions than 8.0.0.129(SP2C01) have an authentication bypass vulnerability. An attacker with high privilege obtains the smart phone and bypass the activation function by some specific operations.
CVE-2018-10362 1 Phpliteadmin 1 Phpliteadmin 2018-06-13 5.0 MEDIUM 9.8 CRITICAL
An issue was discovered in phpLiteAdmin 1.9.5 through 1.9.7.1. Due to loose comparison with '==' instead of '===' in classes/Authorization.php for the user-provided login password, it is possible to login with a simpler password if the password has the form of a power in scientific notation (like '2e2' for '200' or '0e1234' for '0'). This is possible because, in the loose comparison case, PHP interprets the string as a number in scientific notation, and thus converts it to a number. After that, the comparison with '==' casts the user input (e.g., the string '200' or '0') to a number, too. Hence the attacker can login with just a '0' or a simple number he has to brute force. Strong comparison with '===' prevents the cast into numbers.
CVE-2018-7760 1 Schneider-electric 114 140cpu31110, 140cpu31110 Firmware, 140cpu31110c and 111 more 2018-05-24 7.5 HIGH 9.8 CRITICAL
An authorization bypass vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200. Requests to CGI functions allow malicious users to bypass authorization.
CVE-2018-6960 1 Vmware 1 Horizon Daas 2018-05-22 6.5 MEDIUM 8.8 HIGH
VMware Horizon DaaS (7.x before 8.0.0) contains a broken authentication vulnerability that may allow an attacker to bypass two-factor authentication. Note: In order to exploit this issue, an attacker must have a legitimate account on Horizon DaaS.
CVE-2014-0927 1 Ibm 2 Sterling B2b Integrator, Sterling File Gateway 2018-05-22 4.3 MEDIUM 8.1 HIGH
The ActiveMQ admin user interface in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to bypass authentication by leveraging knowledge of the port number and webapp path. IBM X-Force ID: 92259.
CVE-2018-6547 1 Plays.tv 1 Plays.tv 2018-05-21 9.4 HIGH 9.1 CRITICAL
plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, contains an HTTP message parsing function that takes a user-defined path and writes non-user controlled data as SYSTEM to the file when the extract_files parameter is used. This occurs without properly authenticating the user.
CVE-2018-6546 1 Plays.tv 1 Plays.tv 2018-05-21 10.0 HIGH 9.8 CRITICAL
plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, executes code at a user-defined (local or SMB) path as SYSTEM when the execute_installer parameter is used in an HTTP message. This occurs without properly authenticating the user.
CVE-2018-9249 1 Fiberhome 2 Vdsl2 Modem Hg 150-ub, Vdsl2 Modem Hg 150-ub Firmware 2018-05-21 7.5 HIGH 9.8 CRITICAL
FiberHome VDSL2 Modem HG 150-UB devices allow authentication bypass by ignoring the parent.location='login.html' JavaScript code in the response to an unauthenticated request.
CVE-2018-9248 1 Fiberhome 2 Vdsl2 Modem Hg 150-ub, Vdsl2 Modem Hg 150-ub Firmware 2018-05-21 7.5 HIGH 9.8 CRITICAL
FiberHome VDSL2 Modem HG 150-UB devices allow authentication bypass via a "Cookie: Name=0admin" header.
CVE-2016-9646 2 Debian, Ikiwiki 2 Debian Linux, Ikiwiki 2018-05-18 5.0 MEDIUM 5.3 MEDIUM
ikiwiki before 3.20161229 incorrectly called the CGI::FormBuilder->field method (similar to the CGI->param API that led to Bugzilla's CVE-2014-1572), which can be abused to lead to commit metadata forgery.
CVE-2017-0356 2 Debian, Ikiwiki 2 Debian Linux, Ikiwiki 2018-05-18 7.5 HIGH 9.8 CRITICAL
A flaw, similar to to CVE-2016-9646, exists in ikiwiki before 3.20170111, in the passwordauth plugin's use of CGI::FormBuilder, allowing an attacker to bypass authentication via repeated parameters.
CVE-2014-3999 1 Horde 1 Horde Ldap 2018-05-18 6.8 MEDIUM 8.1 HIGH
The Horde_Ldap library before 2.0.6 for Horde allows remote attackers to bypass authentication by leveraging knowledge of the LDAP bind user DN.
CVE-2017-15531 1 Symantec 1 Reporter 2018-05-04 5.0 MEDIUM 9.8 CRITICAL
Symantec Reporter 9.5 prior to 9.5.4.1 and 10.1 prior to 10.1.5.5 does not restrict excessive authentication attempts for management interface users. A remote attacker can use brute force search to guess a user password and gain access to Reporter.
CVE-2016-10434 1 Qualcomm 4 Sd 820, Sd 820 Firmware, Sd 820a and 1 more 2018-05-01 5.0 MEDIUM 7.5 HIGH
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 820 and SD 820A, the input to RPMB write response function is a buffer from HLOS that needs to be authenticated (using HMAC) and then processed. However, some of the processing occurs before the buffer is authenticated. The function will return various types of errors depending on the values of the `response` and `result` fields of the buffer before verifying the HMAC tag.
CVE-2017-14911 1 Qualcomm 28 Apq8096au, Apq8096au Firmware, Mdm9206 and 25 more 2018-04-27 10.0 HIGH 9.8 CRITICAL
In Android before 2018-01-05 on Qualcomm Snapdragon IoT, Snapdragon Mobile, Snapdragon Automobile APQ8096AU, MDM9206, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 625, SD 650/52, SD 820, SD 835, it is possible for the XBL loader to skip the authentication of device config.
CVE-2018-1237 1 Dell 1 Emc Scaleio 2018-04-24 5.0 MEDIUM 9.8 CRITICAL
Dell EMC ScaleIO versions prior to 2.5, contain improper restriction of excessive authentication attempts on the Light installation Agent (LIA). This component is deployed on every server in the ScaleIO cluster and is used for central management of ScaleIO nodes. A remote malicious user, having network access to LIA, could potentially exploit this vulnerability to launch brute force guessing of user names and passwords of user accounts on the LIA.
CVE-2015-4987 1 Ibm 1 Tealeaf Customer Experience 2018-04-23 6.4 MEDIUM 6.5 MEDIUM
The search and replay servers in IBM Tealeaf Customer Experience 8.0 through 9.0.2 allow remote attackers to bypass authentication via unspecified vectors. IBM X-Force ID: 105896.
CVE-2017-17743 1 Ucopia 2 Wireless Appliance, Wireless Appliance Firmware 2018-04-18 6.5 MEDIUM 6.7 MEDIUM
Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices before 4.4.20, 5.0.x before 5.0.19, and 5.1.x before 5.1.11 allows authenticated remote attackers to escape the shell and escalate their privileges by uploading a .bashrc file containing the /bin/sh string. In some situations, authentication can be achieved via the bhu85tgb default password for the admin account.
CVE-2016-9880 1 Pivotal Software 1 Gemfire For Pivotal Cloud Foundry 2018-04-10 7.5 HIGH 9.8 CRITICAL
The GemFire broker for Cloud Foundry 1.6.x before 1.6.5 and 1.7.x before 1.7.1 has multiple API endpoints which do not require authentication and could be used to gain access to the cluster managed by the broker.
CVE-2018-6299 1 Hanwha-security 4 Snh-v6410pn, Snh-v6410pn Firmware, Snh-v6410pnw and 1 more 2018-04-09 7.5 HIGH 9.8 CRITICAL
Authentication bypass in Hanwha Techwin Smartcams
CVE-2018-6294 1 Hanwha-security 4 Snh-v6410pn, Snh-v6410pn Firmware, Snh-v6410pnw and 1 more 2018-04-09 7.5 HIGH 9.8 CRITICAL
Unsecured way of firmware update in Hanwha Techwin Smartcams
CVE-2017-18223 1 Bmc 1 Remedy Action Request System 2018-04-09 6.8 MEDIUM 8.1 HIGH
BMC Remedy AR System before 9.1 SP3, when Remedy AR Authentication is enabled, allows attackers to obtain administrative access.
CVE-2018-1343 1 Netiq 1 Privileged Account Manager 2018-03-29 7.5 HIGH 9.8 CRITICAL
PAM exposure enabling unauthenticated access to remote host
CVE-2017-7638 1 Qnap 2 Media Streaming Add-on, Qts 2018-03-27 6.4 MEDIUM 6.5 MEDIUM
QNAP NAS application Media Streaming add-on version 421.1.0.2, 430.1.2.0, and earlier does not authenticate requests properly. Successful exploitation could lead to change of the Media Streaming settings, and leakage of sensitive information of the QNAP NAS.
CVE-2013-7239 1 Memcached 1 Memcached 2018-03-25 4.8 MEDIUM N/A
memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.
CVE-2016-7114 1 Siemens 2 En100 Ethernet Module, En100 Ethernet Module Firmware 2018-03-23 9.0 HIGH 8.8 HIGH
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02; SIPROTEC 7SJ686 : All versions < V 4.87; SIPROTEC 7UT686 : All versions < V 4.02; SIPROTEC 7SD686 : All versions < V 4.05; SIPROTEC 7SJ66 : All versions < V 4.30. Attackers with network access to the device's web interface (port 80/tcp) could possibly circumvent authentication and perform certain administrative operations. A legitimate user must be logged into the web interface for the attack to be successful.
CVE-2016-7112 1 Siemens 2 En100 Ethernet Module, En100 Ethernet Module Firmware 2018-03-23 10.0 HIGH 9.8 CRITICAL
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02. Attackers with network access to the device's web interface (port 80/tcp) could possibly circumvent authentication and perform certain administrative operations.
CVE-2013-6171 1 Dovecot 1 Dovecot 2018-03-16 5.8 MEDIUM N/A
checkpassword-reply in Dovecot before 2.2.7 performs setuid operations to a user who is authenticating, which allows local users to bypass authentication and access virtual email accounts by attaching to the process and using a restricted file descriptor to modify account information in the response to the dovecot-auth server.
CVE-2011-4973 1 Mod Nss Project 1 Mod Nss 2018-03-15 7.5 HIGH 9.8 CRITICAL
Authentication bypass vulnerability in mod_nss 1.0.8 allows remote attackers to assume the identity of a valid user by using their certificate and entering 'password' as the password.
CVE-2017-6199 1 Sandstorm 1 Sandstorm 2018-03-13 7.5 HIGH 9.8 CRITICAL
A remote attacker could bypass the Sandstorm organization restriction before build 0.203 via a comma in an email-address field.
CVE-2018-6569 1 West-wind 1 Web Connection 2018-03-13 10.0 HIGH 8.8 HIGH
West Wind Web Server 6.x does not require authentication for /ADMIN.ASP.
CVE-2012-2626 1 Sonicwall 1 Scrutinizer 2018-03-08 5.0 MEDIUM N/A
cgi-bin/admin.cgi in the web console in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.0 does not require token authentication, which allows remote attackers to add administrative accounts via a userprefs action.
CVE-2017-18179 1 Progress 1 Sitefinity 2018-03-05 6.5 MEDIUM 8.8 HIGH
Progress Sitefinity 9.1 uses wrap_access_token as a non-expiring authentication token that remains valid after a password change or a session termination. Also, it is transmitted as a GET parameter. This is fixed in 10.1.
CVE-2017-12549 3 Hp, Linux, Microsoft 3 System Management Homepage, Linux Kernel, Windows 2018-03-02 5.5 MEDIUM 5.6 MEDIUM
A local authentication bypass vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found.
CVE-2018-3601 1 Trendmicro 1 Control Manager 2018-02-27 7.5 HIGH 9.8 CRITICAL
A password hash usage authentication bypass vulnerability in Trend Micro Control Manager 6.0 could allow a remote attacker to bypass authentication on vulnerable installations.
CVE-2017-15351 1 Huawei 2 Honor V9 Play, Honor V9 Play Firmware 2018-02-26 7.2 HIGH 6.8 MEDIUM
The 'Find Phone' function in Huawei Honor V9 play smart phones with versions earlier than Jimmy-AL00AC00B135 has an authentication bypass vulnerability. Due to improper authentication realization in the 'Find Phone' function. An attacker may exploit the vulnerability to bypass the 'Find Phone' function in order to use the phone normally.
CVE-2018-5794 1 Extremewireless 1 Wing 2018-02-22 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Extreme Networks ExtremeWireless WiNG 5.x before 5.8.6.9 and 5.9.x before 5.9.1.3. There is No Authentication for the AeroScout Service via a crafted UDP packet.
CVE-2011-4068 1 Packetfence 1 Packetfence 2018-02-21 7.5 HIGH 9.8 CRITICAL
The check_password function in html/admin/login.php in PacketFence before 3.0.2 allows remote attackers to bypass authentication via an empty password.
CVE-2017-5791 1 Hp 1 Intelligent Management Center Plat 2018-02-17 10.0 HIGH 9.8 CRITICAL
The doFilter method in UrlAccessController in HPE Intelligent Management Center (iMC) PLAT 7.2 E0403P06 allows remote bypass of authentication via unspecified strings in a URI.
CVE-2017-1000354 1 Jenkins 1 Jenkins 2018-02-15 6.5 MEDIUM 8.8 HIGH
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to a login command which allowed impersonating any Jenkins user. The `login` command available in the remoting-based CLI stored the encrypted user name of the successfully authenticated user in a cache file used to authenticate further commands. Users with sufficient permission to create secrets in Jenkins, and download their encrypted values (e.g. with Job/Configure permission), were able to impersonate any other Jenkins user on the same instance.