Vulnerabilities > Improper Authentication
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-01-24 | CVE-2022-23126 | Improper Authentication vulnerability in Teslamate Project Teslamate TeslaMate before 1.25.1 (when using the default Docker configuration) allows attackers to open doors of Tesla vehicles, start Keyless Driving, and interfere with vehicle operation en route. | 9.8 |
2022-01-22 | CVE-2022-23807 | Improper Authentication vulnerability in PHPmyadmin An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. | 4.3 |
2022-01-21 | CVE-2021-23196 | Improper Authentication vulnerability in Fresenius-Kabi products The web application on Agilia Link+ version 3.0 implements authentication and session management mechanisms exclusively on the client-side and does not protect authentication attributes sufficiently. | 9.8 |
2022-01-21 | CVE-2021-43355 | Improper Authentication vulnerability in Fresenius-Kabi products Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 allows user input to be validated on the client side without authentication by the server. | 9.8 |
2022-01-21 | CVE-2020-4879 | Improper Authentication vulnerability in IBM Cognos Controller 10.4.0/10.4.1/10.4.2 IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 could allow a remote attacker to bypass security restrictions, caused by improper validation of authentication cookies. | 9.8 |
2022-01-20 | CVE-2021-44736 | Improper Authentication vulnerability in Lexmark Mc3224I Firmware The initial admin account setup wizard on Lexmark devices allow unauthenticated access to the “out of service erase” feature. | 9.8 |
2022-01-18 | CVE-2022-21692 | Improper Authentication vulnerability in Onionshare OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. | 4.3 |
2022-01-18 | CVE-2022-21695 | Improper Authentication vulnerability in Onionshare OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. | 5.3 |
2022-01-15 | CVE-2022-23178 | Improper Authentication vulnerability in Crestron Hd-Md4X2-4K-E Firmware 1.0.0.2159 An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. | 9.8 |
2022-01-13 | CVE-2021-34977 | Improper Authentication vulnerability in Netgear R7000 Firmware 1.0.11.11610.2.100 This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7000 1.0.11.116_10.2.100 routers. | 8.8 |