Total
1125 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-20220 | 1 Teracue | 6 Enc-400 Hdmi, Enc-400 Hdmi2, Enc-400 Hdmi2 Firmware and 3 more | 2020-08-24 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. While the web interface requires authentication before it can be interacted with, a large portion of the HTTP endpoints are missing authentication. An attacker is able to view these pages before being authenticated, and some of these pages may disclose sensitive information. | |||||
CVE-2019-9935 | 1 Lexmark | 50 Cs31x, Cs31x Firmware, Cs41x and 47 more | 2020-08-24 | 5.0 MEDIUM | 5.3 MEDIUM |
Various Lexmark products have Incorrect Access Control (issue 2 of 2). | |||||
CVE-2019-12392 | 1 Anviz | 1 Anviz Firmware | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
Anviz access control devices allow remote attackers to issue commands without a password. | |||||
CVE-2019-10886 | 1 Sony | 89 Kdl-50w800c, Kdl-50w805c, Kdl-50w807c and 86 more | 2020-08-24 | 4.3 MEDIUM | 5.9 MEDIUM |
An incorrect access control exists in the Sony Photo Sharing Plus application in the firmware before PKG6.5629 version (for the X7500D TV and other applicable TVs). This vulnerability allows an attacker to read arbitrary files without authentication over HTTP when Photo Sharing Plus application is running. This may allow an attacker to browse a particular directory (e.g. images) inside the private network. | |||||
CVE-2019-10946 | 1 Joomla | 1 Joomla\! | 2020-08-24 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in Joomla! before 3.9.5. The "refresh list of helpsites" endpoint of com_users lacks access checks, allowing calls from unauthenticated users. | |||||
CVE-2019-12505 | 1 Inateck | 2 Wp1001, Wp1001 Firmware | 2020-08-24 | 8.3 HIGH | 8.8 HIGH |
Due to unencrypted and unauthenticated data communication, the wireless presenter Inateck WP1001 v1.3C is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device. | |||||
CVE-2019-16907 | 1 Infosysta | 1 In-app \& Desktop Notifications | 2020-08-24 | 5.0 MEDIUM | 5.3 MEDIUM |
An issue was discovered in the Infosysta "In-App & Desktop Notifications" app 1.6.13_J8 for Jira. It is possible to obtain a list of all valid Jira usernames without authentication/authorization via the plugins/servlet/nfj/UserFilter?searchQuery=@ URI. | |||||
CVE-2019-10046 | 1 Pydio | 1 Pydio | 2020-08-24 | 5.0 MEDIUM | 5.3 MEDIUM |
An unauthenticated attacker can obtain information about the Pydio 8.2.2 configuration including session timeout, libraries, and license information. | |||||
CVE-2019-12503 | 1 Inateck | 2 Bcst-60, Bcst-60 Firmware | 2020-08-24 | 10.0 HIGH | 9.8 CRITICAL |
Due to unencrypted and unauthenticated data communication, the wireless barcode scanner Inateck BCST-60 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device. | |||||
CVE-2019-9585 | 1 Eq-3 | 4 Homematic Ccu2, Homematic Ccu2 Firmware, Homematic Ccu3 and 1 more | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
eQ-3 Homematic CCU2 prior to 2.47.10 and CCU3 prior to 3.47.10 JSON API has Improper Access Control for Interface.***Metadata related operations, resulting in the ability to read, set and deletion of Metadata. | |||||
CVE-2019-10040 | 1 Dlink | 2 Dir-816, Dir-816 Firmware | 2020-08-24 | 10.0 HIGH | 9.8 CRITICAL |
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use a hidden API URL /goform/SystemCommand to execute a system command without authentication. | |||||
CVE-2018-6223 | 1 Trendmicro | 1 Email Encryption Gateway | 2020-08-24 | 5.0 MEDIUM | 9.8 CRITICAL |
A missing authentication for appliance registration vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to manipulate the registration process of the product to reset configuration parameters. | |||||
CVE-2019-11466 | 1 Couchbase | 1 Couchbase Server | 2020-08-24 | 5.0 MEDIUM | 5.3 MEDIUM |
In Couchbase Server 6.0.0 and 5.5.0, the eventing service exposes system diagnostic profile via an HTTP endpoint that does not require credentials on a port earmarked for internal traffic only. This has been remedied in version 6.0.1 and now requires valid credentials to access. | |||||
CVE-2019-15064 | 1 Hinet | 2 Gpon, Gpon Firmware | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
HiNet GPON firmware version < I040GWR190731 allows an attacker login to device without any authentication. | |||||
CVE-2019-7564 | 1 Coship | 8 Rt3050, Rt3050 Firmware, Rt3052 and 5 more | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices. The password reset functionality of the Wireless SSID doesn't require any type of authentication. By making a POST request to the regx/wireless/wl_security_2G.asp URI, the attacker can change the password of the Wi-FI network. | |||||
CVE-2019-17219 | 1 Vzug | 2 Combi-stream Mslq, Combi-stream Mslq Firmware | 2020-08-24 | 5.8 MEDIUM | 8.8 HIGH |
An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. By default, the device does not enforce any authentication. An adjacent attacker is able to use the network interface without proper access control. | |||||
CVE-2019-17511 | 1 Dlink | 2 Dir-412, Dir-412 Firmware | 2020-08-24 | 5.0 MEDIUM | 7.5 HIGH |
There are some web interfaces without authentication requirements on D-Link DIR-412 A1-1.14WW routers. An attacker can get the router's log file via log_get.php, which could be used to discover the intranet network structure. | |||||
CVE-2019-11523 | 1 Anviz | 2 M3, M3 Firmware | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address). | |||||
CVE-2019-11496 | 1 Couchbase | 1 Couchbase Server | 2020-08-24 | 6.4 MEDIUM | 9.1 CRITICAL |
In versions of Couchbase Server prior to 5.0, the bucket named "default" was a special bucket that allowed read and write access without authentication. As part of 5.0, the behavior of all buckets including "default" were changed to only allow access by authenticated users with sufficient authorization. However, users were allowed unauthenticated and unauthorized access to the "default" bucket if the properties of this bucket were edited. This has been fixed in versions 5.1.0 and 5.5.0. | |||||
CVE-2019-10042 | 1 Dlink | 2 Dir-816, Dir-816 Firmware | 2020-08-24 | 7.8 HIGH | 7.5 HIGH |
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/LoadDefaultSettings to reset the router without authentication. |