Vulnerabilities > Improper Authentication

DATE CVE VULNERABILITY TITLE RISK
2020-09-01 CVE-2020-5777 Improper Authentication vulnerability in Magmi Project Magmi
MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure.
network
low complexity
magmi-project CWE-287
critical
9.8
2020-08-31 CVE-2020-24786 Improper Authentication vulnerability in Zohocorp products
An issue was discovered in Zoho ManageEngine Exchange Reporter Plus before build number 5510, AD360 before build number 4228, ADSelfService Plus before build number 5817, DataSecurity Plus before build number 6033, RecoverManager Plus before build number 6017, EventLog Analyzer before build number 12136, ADAudit Plus before build number 6052, O365 Manager Plus before build number 4334, Cloud Security Plus before build number 4110, ADManager Plus before build number 7055, and Log360 before build number 5166.
network
low complexity
zohocorp CWE-287
critical
9.8
2020-08-30 CVE-2020-8097 Improper Authentication vulnerability in Bitdefender Endpoint Security and Endpoint Security Tools
An improper authentication vulnerability in Bitdefender Endpoint Security Tools for Windows and Bitdefender Endpoint Security SDK allows an unprivileged local attacker to escalate privileges or tamper with the product's security settings.
local
low complexity
bitdefender CWE-287
7.8
2020-08-27 CVE-2020-15605 Improper Authentication vulnerability in Trendmicro Deep Security Manager and vulnerability Protection
If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Vulnerability Protection 2.0 SP2 could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication.
network
high complexity
trendmicro CWE-287
8.1
2020-08-27 CVE-2020-15601 Improper Authentication vulnerability in Trendmicro Deep Security Manager and vulnerability Protection
If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Deep Security 10.x-12.x could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication.
network
high complexity
trendmicro CWE-287
8.1
2020-08-27 CVE-2020-4167 Improper Authentication vulnerability in IBM Security Guardium Insights 2.0.1
IBM Security Guardium Insights 2.0.1 could allow an attacker to obtain sensitive information or perform unauthorized actions due to improper authenciation mechanisms.
network
low complexity
ibm CWE-287
6.5
2020-08-26 CVE-2020-3151 Improper Authentication vulnerability in Cisco Connected Mobile Experiences 10.6.0/10.6.1/10.6.2
A vulnerability in the CLI of Cisco Connected Mobile Experiences (CMX) could allow an authenticated, local attacker with administrative credentials to bypass restrictions on the CLI.
local
low complexity
cisco CWE-287
6.7
2020-08-26 CVE-2020-16251 Improper Authentication vulnerability in Hashicorp Vault
HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass.
network
low complexity
hashicorp CWE-287
8.2
2020-08-24 CVE-2020-24612 Improper Authentication vulnerability in Fedoraproject Selinux-Policy 20200824/3.14
An issue was discovered in the selinux-policy (aka Reference Policy) package 3.14 through 2020-08-24 because the .config/Yubico directory is mishandled.
local
high complexity
fedoraproject CWE-287
4.7
2020-08-24 CVE-2020-19888 Improper Authentication vulnerability in Dbhcms Project Dbhcms 1.2.0
DBHcms v1.2.0 has an unauthorized operation vulnerability because there's no access control at line 175 of dbhcms\page.php for empty cache operation.
network
high complexity
dbhcms-project CWE-287
5.9