Vulnerabilities > Authentication Bypass by Capture-replay
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-10-24 | CVE-2018-17903 | Authentication Bypass by Capture-replay vulnerability in Sagaradio Saga1-L8B Firmware SAGA1-L8B with any firmware versions prior to A0.10 are vulnerable to a replay attack and command forgery. | 9.1 |
2018-10-24 | CVE-2018-17935 | Authentication Bypass by Capture-replay vulnerability in Telecrane products All versions of Telecrane F25 Series Radio Controls before 00.0A use fixed codes that are reproducible by sniffing and re-transmission. | 8.1 |
2018-09-18 | CVE-2018-17176 | Authentication Bypass by Capture-replay vulnerability in Neatorobotics products A replay issue was discovered on Neato Botvac Connected 2.2.0 devices. | 7.5 |
2018-09-14 | CVE-2018-16242 | Authentication Bypass by Capture-replay vulnerability in O.Bike products oBike relies on Hangzhou Luoping Smart Locker to lock bicycles, which allows attackers to bypass the locking mechanism by using Bluetooth Low Energy (BLE) to replay ciphertext based on a predictable nonce used in the locking protocol. | 5.3 |
2018-08-29 | CVE-2018-7790 | Authentication Bypass by Capture-replay vulnerability in Schneider-Electric Modicon M221 Firmware 1.1.1.5 An Information Management Error vulnerability exists in Schneider Electric's Modicon M221 product (all references, all versions prior to firmware V1.6.2.0). | 9.8 |
2017-10-13 | CVE-2017-11786 | Authentication Bypass by Capture-replay vulnerability in Microsoft Lync and Skype for Business Skype for Business in Microsoft Lync 2013 SP1 and Skype for Business 2016 allows an attacker to steal an authentication hash that can be reused elsewhere, due to how Skype for Business handles authentication requests, aka "Skype for Business Elevation of Privilege Vulnerability." | 8.8 |
2017-03-12 | CVE-2017-6823 | Authentication Bypass by Capture-replay vulnerability in Fiyo CMS 2.0.6.1 Fiyo CMS 2.0.6.1 allows remote authenticated users to gain privileges via a modified level parameter to dapur/ in an app=user&act=edit action. | 8.8 |