Vulnerabilities > Improper Authentication
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2013-07-20 | CVE-2013-3656 | Improper Authentication vulnerability in Cybozu Office Cybozu Office 9.1.0 and earlier does not properly manage sessions, which allows remote attackers to bypass authentication by leveraging knowledge of a login URL. | 5.8 |
2013-07-18 | CVE-2013-4877 | Improper Authentication vulnerability in Verizon Wireless Network Extender Scs26Uc4/Scs2U01 The Verizon Wireless Network Extender SCS-26UC4 and SCS-2U01 does not use CAVE authentication, which makes it easier for remote attackers to obtain ESN and MIN values from arbitrary phones, and conduct cloning attacks, by sniffing the network for registration packets. | 2.6 |
2013-07-18 | CVE-2013-4875 | Improper Authentication vulnerability in Verizon Wireless Network Extender Scs2U01 The Uboot bootloader on the Verizon Wireless Network Extender SCS-2U01 allows physically proximate attackers to bypass the intended boot process and obtain a login prompt by connecting a crafted HDMI cable and sending a SysReq interrupt. | 6.2 |
2013-07-18 | CVE-2013-4874 | Improper Authentication vulnerability in Verizon Wireless Network Extender Scs26Uc4 The Uboot bootloader on the Verizon Wireless Network Extender SCS-26UC4 allows physically proximate attackers to obtain root access by connecting a crafted HDMI cable and using a sys session to modify the ramboot environment variable. | 6.2 |
2013-07-08 | CVE-2013-4784 | Improper Authentication vulnerability in HP Integrated Lights-Out BMC The HP Integrated Lights-Out (iLO) BMC implementation allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password. | 10.0 |
2013-07-08 | CVE-2013-4783 | Improper Authentication vulnerability in Dell Idrac6 BMC The Dell iDRAC6 with firmware 1.x before 1.92 and 2.x and 3.x before 3.42, and iDRAC7 with firmware before 1.23.23, allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password. | 10.0 |
2013-07-08 | CVE-2013-4782 | Improper Authentication vulnerability in Supermicro BMC The Supermicro BMC implementation allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password. | 10.0 |
2013-07-02 | CVE-2013-3581 | Improper Authentication vulnerability in Choice Wireless Wixfmr-111 ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote attackers to obtain sensitive information via an Ajax (1) wmxState or (2) netState request. | 7.1 |
2013-06-30 | CVE-2013-4731 | Improper Authentication vulnerability in Choice-Wireless Wixfmr-111 ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote attackers to execute arbitrary commands via shell metacharacters in the pip parameter in an Ajax tag_ipPing request, a different vulnerability than CVE-2013-3581. | 9.3 |
2013-06-17 | CVE-2013-2310 | Improper Authentication vulnerability in multiple products SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network. | 3.3 |