Vulnerabilities > Improper Authentication
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-07-13 | CVE-2016-9497 | Improper Authentication vulnerability in Hughes products Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, is vulnerable to an authentication bypass using an alternate path or channel. | 8.8 |
2018-07-13 | CVE-2016-9482 | Improper Authentication vulnerability in Jqueryform PHP Formmail Generator Code generated by PHP FormMail Generator may allow a remote unauthenticated user to bypass authentication in the to access the administrator panel by navigating directly to /admin.php?mod=admin&func=panel | 9.8 |
2018-07-13 | CVE-2016-6549 | Improper Authentication vulnerability in Nutspace NUT Mobile The Zizai Tech Nut device allows unauthenticated Bluetooth pairing, which enables unauthenticated connected applications to write data to the device name attribute. | 4.3 |
2018-07-13 | CVE-2016-6544 | Improper Authentication vulnerability in Ieasytec Itrack Easy getgps data in iTrack Easy can be modified without authentication by setting the data using the parametercmd:setothergps. | 7.5 |
2018-07-11 | CVE-2018-8171 | Improper Authentication vulnerability in Microsoft products A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated, aka "ASP.NET Security Feature Bypass Vulnerability." This affects ASP.NET, ASP.NET Core 1.1, ASP.NET Core 1.0, ASP.NET Core 2.0, ASP.NET MVC 5.2. | 7.5 |
2018-07-10 | CVE-2018-1129 | Improper Authentication vulnerability in multiple products A flaw was found in the way signature calculation was handled by cephx authentication protocol. | 6.5 |
2018-07-10 | CVE-2018-1128 | Improper Authentication vulnerability in multiple products It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. | 7.5 |
2018-07-10 | CVE-2018-10861 | Improper Authentication vulnerability in multiple products A flaw was found in the way ceph mon handles user requests. | 8.1 |
2018-07-06 | CVE-2016-6541 | Improper Authentication vulnerability in Thetrackr Trackr Bravo Firmware TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes. | 8.8 |
2018-07-05 | CVE-2018-3761 | Improper Authentication vulnerability in Nextcloud Server Nextcloud Server before 12.0.8 and 13.0.3 suffer from improper authentication on the OAuth2 token endpoint. | 8.1 |