Vulnerabilities > Improper Authentication

DATE CVE VULNERABILITY TITLE RISK
2022-12-30 CVE-2022-4861 Improper Authentication vulnerability in M-Files Client
Incorrect implementation in authentication protocol in M-Files Client before 22.5.11356.0 allows high privileged user to get other users tokens to another resource.
network
low complexity
m-files CWE-287
4.9
2022-12-28 CVE-2022-41579 Improper Authentication vulnerability in Huawei Hota-Fara-B19 Firmware 11.1.2.40
There is an insufficient authentication vulnerability in some Huawei band products.
network
low complexity
huawei CWE-287
6.5
2022-12-28 CVE-2022-23555 Improper Authentication vulnerability in Goauthentik Authentik
authentik is an open-source Identity Provider focused on flexibility and versatility.
network
low complexity
goauthentik CWE-287
8.8
2022-12-27 CVE-2020-36569 Improper Authentication vulnerability in Digitalocean Golang-Nanoauth
Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty token.
network
low complexity
digitalocean CWE-287
critical
9.1
2022-12-27 CVE-2022-3156 Improper Authentication vulnerability in Rockwellautomation Studio 5000 Logix Emulate 20.011/33.00
A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software.  Users are granted elevated permissions on certain product services when the software is installed. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software.
local
low complexity
rockwellautomation CWE-287
7.8
2022-12-27 CVE-2022-4722 Improper Authentication vulnerability in Ikus-Soft Rdiffweb
Authentication Bypass by Primary Weakness in GitHub repository ikus060/rdiffweb prior to 2.5.5.
network
low complexity
ikus-soft CWE-287
7.2
2022-12-23 CVE-2022-47633 Improper Authentication vulnerability in Kyverno 1.8.3/1.8.4
An image signature validation bypass vulnerability in Kyverno 1.8.3 and 1.8.4 allows a malicious image registry (or a man-in-the-middle attacker) to inject unsigned arbitrary container images into a protected Kubernetes cluster.
network
high complexity
kyverno CWE-287
8.1
2022-12-22 CVE-2022-35646 Improper Authentication vulnerability in IBM Security Verify Governance 10.0.1
IBM Security Verify Governance, Identity Manager 10.0.1 software component could allow an authenticated user to modify or cancel any other user's access request using man-in-the-middle techniques.
network
high complexity
ibm CWE-287
5.3
2022-12-22 CVE-2022-46170 Improper Authentication vulnerability in Codeigniter
CodeIgniter is a PHP full-stack web framework.
network
low complexity
codeigniter CWE-287
critical
9.8
2022-12-20 CVE-2022-41590 Improper Authentication vulnerability in Huawei Harmonyos 3.0.0
Some smartphones have authentication-related (including session management) vulnerabilities as the setup wizard is bypassed.
local
low complexity
huawei CWE-287
5.5