Vulnerabilities (CVE)

Filtered by CWE-305
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-2959 1 Olivaekspertiz 1 Oliva Ekspertiz 2023-08-16 N/A 7.5 HIGH
Authentication Bypass by Primary Weakness vulnerability in Oliva Expertise Oliva Expertise EKS allows Collect Data as Provided by Users.This issue affects Oliva Expertise EKS: before 1.2.
CVE-2023-1833 1 Redline 1 Router Firmware 2023-08-02 N/A 9.8 CRITICAL
Authentication Bypass by Primary Weakness vulnerability in DTS Electronics Redline Router firmware allows Authentication Bypass.This issue affects Redline Router: before 7.17.
CVE-2021-3850 1 Adodb Project 1 Adodb 2022-02-06 6.4 MEDIUM 9.1 CRITICAL
Authentication Bypass by Primary Weakness in GitHub repository adodb/adodb prior to 5.20.21.
CVE-2020-14359 1 Redhat 1 Louketo Proxy 2021-06-22 7.5 HIGH 7.3 HIGH
A vulnerability was found in all versions of keycloak, where on using lower case HTTP headers (via cURL) we can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.
CVE-2020-15787 1 Siemens 2 Simatic Hmi United Comfort Panels, Simatic Hmi United Comfort Panels Firmware 2021-06-08 5.0 MEDIUM 9.8 CRITICAL
A vulnerability has been identified in SIMATIC HMI Unified Comfort Panels (All versions <= V16). Affected devices insufficiently validate authentication attempts as the information given can be truncated to match only a set number of characters versus the whole provided string. This could allow a remote attacker to discover user passwords and obtain access to the Sm@rt Server via a brute-force attack.
CVE-2021-21403 1 Kongchuanhujiao Project 1 Kongchuanhujiao 2021-03-30 7.5 HIGH 9.8 CRITICAL
In github.com/kongchuanhujiao/server before version 1.3.21 there is an authentication Bypass by Primary Weakness vulnerability. All users are impacted. This is fixed in version 1.3.21.
CVE-2020-10923 1 Netgear 2 R6700, R6700 Firmware 2020-07-29 8.3 HIGH 8.8 HIGH
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000. A crafted UPnP message can be used to bypass authentication. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9642.