Vulnerabilities (CVE)

Filtered by CWE-287
Total 3455 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2013-4976 1 Hikvision 2 Ds-2cd7153-e, Ds-2cd7153-e Firmware 2020-01-10 7.5 HIGH 9.8 CRITICAL
Hikvision DS-2CD7153-E IP Camera has security bypass via hardcoded credentials
CVE-2013-5122 1 Cisco 8 Linksys E4200, Linksys E4200 Firmware, Linksys Ea2700 and 5 more 2020-01-09 10.0 HIGH 9.8 CRITICAL
Cisco Linksys Routers EA2700, EA3500, E4200, EA4500: A bug can cause an unsafe TCP port to open which leads to unauthenticated access
CVE-2013-3085 1 Belkin 2 F5d8236-4, F5d8236-4 Firmware 2020-01-09 7.5 HIGH 9.8 CRITICAL
An authentication bypass exists in the web management interface in Belkin F5D8236-4 v2.
CVE-2019-16327 1 Dlink 2 Dir-601, Dir-601 Firmware 2020-01-08 7.5 HIGH 9.8 CRITICAL
D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product.
CVE-2018-20489 1 Gitlab 1 Gitlab 2020-01-08 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control.
CVE-2013-4621 1 Magdevgroup 1 Magnolia Cms 2020-01-04 7.5 HIGH 9.8 CRITICAL
Magnolia CMS before 4.5.9 has multiple access bypass vulnerabilities
CVE-2012-3462 1 Fedoraproject 1 Sssd 2020-01-03 6.5 MEDIUM 8.8 HIGH
A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.
CVE-2019-5486 1 Gitlab 1 Gitlab 2019-12-30 6.5 MEDIUM 8.8 HIGH
A authentication bypass vulnerability exists in GitLab CE/EE <v12.3.2, <v12.2.6, and <v12.1.10 in the Salesforce login integration that could be used by an attacker to create an account that bypassed domain restrictions and email verification requirements.
CVE-2019-19982 1 Icegram 1 Email Subscribers \& Newsletters 2019-12-30 5.0 MEDIUM 5.3 MEDIUM
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed for unauthenticated option creation. In order to exploit this vulnerability, an attacker would need to send a /wp-admin/admin-post.php?es_skip=1&option_name= request.
CVE-2019-5253 1 Huawei 2 E5572-855, E5572-855 Firmware 2019-12-30 7.1 HIGH 5.9 MEDIUM
E5572-855 with versions earlier than 8.0.1.3(H335SP1C233) has an improper authentication vulnerability. The device does not perform a sufficient authentication when doing certain operations, successful exploit could allow an attacker to cause the device to reboot after launch a man in the middle attack.
CVE-2019-5252 1 Huawei 12 Enjoy 8 Plus, Enjoy 8 Plus Firmware, Honor 8x and 9 more 2019-12-27 3.6 LOW 3.5 LOW
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-8533 1 Apple 1 Mac Os X 2019-12-26 4.6 MEDIUM 7.8 HIGH
A lock handling issue was addressed with improved lock handling. This issue is fixed in macOS Mojave 10.14.4. A Mac may not lock when disconnecting from an external monitor.
CVE-2019-8804 1 Apple 2 Ipados, Iphone Os 2019-12-26 2.9 LOW 5.7 MEDIUM
An inconsistency in Wi-Fi network configuration settings was addressed. This issue is fixed in iOS 13.2 and iPadOS 13.2. An attacker in physical proximity may be able to force a user onto a malicious Wi-Fi network during device setup.
CVE-2019-8704 1 Apple 2 Iphone Os, Tvos 2019-12-20 2.1 LOW 5.5 MEDIUM
An authentication issue was addressed with improved state management. This issue is fixed in tvOS 13. A local user may be able to leak sensitive user information.
CVE-2014-8650 2 Debian, Requests-kerberos Project 2 Debian Linux, Requests-kerberos 2019-12-19 7.5 HIGH 9.8 CRITICAL
python-requests-Kerberos through 0.5 does not handle mutual authentication
CVE-2019-19507 1 Json Pattern Validator Project 1 Json Pattern Validator 2019-12-19 5.0 MEDIUM 5.3 MEDIUM
In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
CVE-2014-1867 1 Suphp 1 Suphp 2019-12-17 4.4 MEDIUM 7.8 HIGH
suPHP before 0.7.2 source-highlighting feature allows security bypass which could lead to arbitrary code execution
CVE-2019-18380 1 Symantec 1 Industrial Control System Protection 2019-12-17 3.3 LOW 6.5 MEDIUM
Symantec Industrial Control System Protection (ICSP), versions 6.x.x, may be susceptible to an unauthorized access issue that could potentially allow a threat actor to create or modify application user accounts without proper authentication.
CVE-2019-5218 1 Huawei 4 Band 2, Band 2 Firmware, Band 3 and 1 more 2019-12-16 5.8 MEDIUM 8.8 HIGH
There is an insufficient authentication vulnerability in Huawei Band 2 and Honor Band 3. The band does not sufficiently authenticate the device try to connect to it in certain scenario. Successful exploit could allow the attacker to spoof then connect to the band.
CVE-2019-14909 1 Redhat 1 Keycloak 2019-12-16 7.5 HIGH 8.3 HIGH
A vulnerability was found in Keycloak 7.x where the user federation LDAP bind type is none (LDAP anonymous bind), any password, invalid or valid will be accepted.