Vulnerabilities > Improper Authentication

DATE CVE VULNERABILITY TITLE RISK
2018-07-13 CVE-2016-9497 Improper Authentication vulnerability in Hughes products
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, is vulnerable to an authentication bypass using an alternate path or channel.
low complexity
hughes CWE-287
8.8
2018-07-13 CVE-2016-9482 Improper Authentication vulnerability in Jqueryform PHP Formmail Generator
Code generated by PHP FormMail Generator may allow a remote unauthenticated user to bypass authentication in the to access the administrator panel by navigating directly to /admin.php?mod=admin&func=panel
network
low complexity
jqueryform CWE-287
critical
9.8
2018-07-13 CVE-2016-6549 Improper Authentication vulnerability in Nutspace NUT Mobile
The Zizai Tech Nut device allows unauthenticated Bluetooth pairing, which enables unauthenticated connected applications to write data to the device name attribute.
low complexity
nutspace CWE-287
4.3
2018-07-13 CVE-2016-6544 Improper Authentication vulnerability in Ieasytec Itrack Easy
getgps data in iTrack Easy can be modified without authentication by setting the data using the parametercmd:setothergps.
network
low complexity
ieasytec CWE-287
7.5
2018-07-11 CVE-2018-8171 Improper Authentication vulnerability in Microsoft products
A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated, aka "ASP.NET Security Feature Bypass Vulnerability." This affects ASP.NET, ASP.NET Core 1.1, ASP.NET Core 1.0, ASP.NET Core 2.0, ASP.NET MVC 5.2.
network
low complexity
microsoft CWE-287
7.5
2018-07-10 CVE-2018-1129 Improper Authentication vulnerability in multiple products
A flaw was found in the way signature calculation was handled by cephx authentication protocol.
low complexity
redhat ceph debian opensuse CWE-287
6.5
2018-07-10 CVE-2018-1128 Improper Authentication vulnerability in multiple products
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack.
high complexity
redhat debian opensuse CWE-287
7.5
2018-07-10 CVE-2018-10861 Improper Authentication vulnerability in multiple products
A flaw was found in the way ceph mon handles user requests.
network
low complexity
ceph redhat opensuse debian CWE-287
8.1
2018-07-06 CVE-2016-6541 Improper Authentication vulnerability in Thetrackr Trackr Bravo Firmware
TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes.
low complexity
thetrackr CWE-287
8.8
2018-07-05 CVE-2018-3761 Improper Authentication vulnerability in Nextcloud Server
Nextcloud Server before 12.0.8 and 13.0.3 suffer from improper authentication on the OAuth2 token endpoint.
network
low complexity
nextcloud CWE-287
8.1