Vulnerabilities > Improper Authentication

DATE CVE VULNERABILITY TITLE RISK
2025-05-25 CVE-2025-5149 A vulnerability was found in WCMS up to 8.3.11.
network
high complexity
CWE-287
5.6
2025-05-16 CVE-2025-4755 A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125).
network
low complexity
CWE-287
7.3
2025-05-13 CVE-2025-26685 Improper Authentication vulnerability in Microsoft Defender for Identity
Improper authentication in Microsoft Defender for Identity allows an unauthorized attacker to perform spoofing over an adjacent network.
low complexity
microsoft CWE-287
6.5
2025-05-09 CVE-2025-4494 A vulnerability, which was classified as critical, was found in JAdmin-JAVA JAdmin 1.0.
network
low complexity
CWE-287
7.3
2025-05-06 CVE-2025-22477 Improper Authentication vulnerability in Dell Storage Manager 16.3.20/2016/2020
Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Authentication vulnerability.
low complexity
dell CWE-287
8.8
2025-05-06 CVE-2025-46590 Improper Authentication vulnerability in Huawei Harmonyos 5.0.0
Bypass vulnerability in the network search instruction authentication module Impact: Successful exploitation of this vulnerability can bypass authentication and enable access to some network search functions.
network
low complexity
huawei CWE-287
6.5
2025-04-25 CVE-2024-11917 The JobSearch WP Job Board plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.8.8.
network
high complexity
CWE-287
8.1
2025-04-22 CVE-2025-3850 A vulnerability, which was classified as problematic, has been found in YXJ2018 SpringBoot-Vue-OnlineExam 1.0.
network
high complexity
CWE-287
3.7
2025-03-27 CVE-2025-30361 Improper Authentication vulnerability in Wegia
WeGIA is a Web manager for charitable institutions.
network
low complexity
wegia CWE-287
critical
9.8
2025-03-19 CVE-2025-26475 Improper Authentication vulnerability in Dell Secure Connect Gateway 5.26.00.20
Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.26, Enables Live-Restore setting which enhances security by keeping containers running during daemon restarts, reducing attack exposure, preventing accidental misconfigurations, and ensuring security controls remain active.
network
high complexity
dell CWE-287
5.5