Vulnerabilities (CVE)

Filtered by CWE-306
Total 1125 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10668 1 Librenms 1 Librenms 2020-08-24 6.4 MEDIUM 9.1 CRITICAL
An issue was discovered in LibreNMS through 1.47. A number of scripts import the Authentication libraries, but do not enforce an actual authentication check. Several of these scripts disclose information or expose functions that are of a sensitive nature and are not expected to be publicly accessible.
CVE-2019-15819 1 Restaurant Reservations Project 1 Restaurant Reservations 2020-08-24 7.5 HIGH 9.8 CRITICAL
The nd-restaurant-reservations plugin before 1.5 for WordPress has no requirement for nd_rst_import_settings_php_function authentication.
CVE-2019-12128 1 Onap 1 Open Network Automation Platform 2020-08-24 10.0 HIGH 9.8 CRITICAL
In ONAP SO through Dublin, by accessing an applicable port (30234, 30290, 32010, 30270, 30224, 30281, 30254, 30285, and/or 30271), an attacker gains full access to the respective ONAP services without any authentication. All ONAP Operations Manager (OOM) setups are affected.
CVE-2019-11063 1 Asus 1 Smarthome 2020-08-24 8.3 HIGH 8.8 HIGH
A broken access control vulnerability in SmartHome app (Android versions up to 3.0.42_190515, ios versions up to 2.0.22) allows an attacker in the same local area network to list user accounts and control IoT devices that connect with its gateway (HG100) via http://[target]/smarthome/devicecontrol without any authentication. CVSS 3.0 base score 10 (Confidentiality, Integrity and Availability impacts). CVSS vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
CVE-2019-11061 1 Asus 2 Hg100, Hg100 Firmware 2020-08-24 4.8 MEDIUM 8.1 HIGH
A broken access control vulnerability in HG100 firmware versions up to 4.00.06 allows an attacker in the same local area network to control IoT devices that connect with itself via http://[target]/smarthome/devicecontrol without any authentication. CVSS 3.0 base score 10 (Confidentiality, Integrity and Availability impacts). CVSS vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
CVE-2019-7727 1 Nice 1 Engage 2020-08-24 7.5 HIGH 9.8 CRITICAL
In NICE Engage through 6.5, the default configuration binds an unauthenticated JMX/RMI interface to all network interfaces, without restricting registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol by using the JMX connector. The observed affected TCP port is 6338 but, based on the product's configuration, a different one could be vulnerable.
CVE-2019-10121 1 Eq-3 4 Ccu2, Ccu2 Firmware, Ccu3 and 1 more 2020-08-24 7.5 HIGH 9.8 CRITICAL
eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.15 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via the user authentication dialogue, aka HMCCU-153. This leads to automatic login as admin.
CVE-2019-12389 1 Anviz 1 Anviz Firmware 2020-08-24 5.0 MEDIUM 7.5 HIGH
Anviz access control devices expose credentials (names and passwords) by allowing remote attackers to query this information without credentials via port tcp/5010.
CVE-2019-0312 1 Sap 1 Netweaver Process Integration 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
Several web pages provided SAP NetWeaver Process Integration (versions: SAP_XIESR: 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50 and SAP_XITOOL: 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50) are not password protected. An attacker could access landscape information like host names, ports or other technical data in the absence of restrictive firewall and port settings.
CVE-2019-15932 1 Intesync 1 Solismed 2020-08-24 7.5 HIGH 9.8 CRITICAL
Intesync Solismed 3.3sp has Incorrect Access Control.
CVE-2019-13406 1 Androvideo 2 Vd 1, Vd 1 Firmware 2020-08-24 5.0 MEDIUM 7.5 HIGH
A broken access control vulnerability found in Advan VD-1 firmware versions up to 230. An attacker can send a POST request to cgibin/ApkUpload.cgi to install arbitrary APK without any authentication.
CVE-2018-1757 1 Ibm 1 Security Identity Governance And Intelligence 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
IBM Security Identity Governance and Intelligence 5.2.3.2 and 5.2.4 could allow an attacker to obtain sensitive information due to missing authentication in IGI for the survey application. IBM X-Force ID: 148601.
CVE-2019-13131 1 Supermicro 1 Superdoctor 5 2020-08-24 7.5 HIGH 9.8 CRITICAL
Super Micro SuperDoctor 5, when restrictions are not implemented in agent.cfg, allows remote attackers to execute arbitrary commands via NRPE.
CVE-2019-17354 1 Zyxel 2 Nbg-418n V2, Nbg-418n V2 Firmware 2020-08-24 7.5 HIGH 9.4 CRITICAL
wan.htm page on Zyxel NBG-418N v2 with firmware version V1.00(AARP.9)C0 can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify data fields of the page.
CVE-2019-15106 1 Zohocorp 1 Manageengine Opmanager 2020-08-24 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm.
CVE-2019-12890 1 Redwoodhq 1 Redwoodhq 2020-08-24 7.5 HIGH 9.8 CRITICAL
RedwoodHQ 2.5.5 does not require any authentication for database operations, which allows remote attackers to create admin users via a con.automationframework users insert_one call.
CVE-2019-3948 2 Amcrest, Dahua 13 Ip2m-841b, Ip2m-841b Firmware, Dh-ipc-hx863x and 10 more 2020-08-24 5.0 MEDIUM 7.5 HIGH
The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device.
CVE-2019-17506 1 Dlink 4 Dir-817lw A1, Dir-817lw A1 Firmware, Dir-868l B1 and 1 more 2020-08-24 10.0 HIGH 9.8 CRITICAL
There are some web interfaces without authentication requirements on D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers. An attacker can get the router's username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_GROUP=1%0a to getcfg.php. This could be used to control the router remotely.
CVE-2019-13405 1 Androvideo 2 Vd 1, Vd 1 Firmware 2020-08-24 10.0 HIGH 9.8 CRITICAL
A broken access control vulnerability found in Advan VD-1 firmware version 230 leads to insecure ADB service. An attacker can send a POST request to cgibin/AdbSetting.cgi to enable ADB without any authentication then take the compromised device as a relay or to install mining software.
CVE-2019-10041 1 Dlink 2 Dir-816, Dir-816 Firmware 2020-08-24 5.0 MEDIUM 9.8 CRITICAL
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/form2userconfig.cgi to edit the system account without authentication.