CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Related To CWE-287

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2023-28609 287 2023-03-18 2023-03-23
0.0
None ??? ??? ??? ??? ??? ???
api/auth.go in Ansible Semaphore before 2.8.89 mishandles authentication.
2 CVE-2023-28461 287 Exec Code 2023-03-15 2023-03-24
0.0
None ??? ??? ??? ??? ??? ???
Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."
3 CVE-2023-27582 287 Bypass 2023-03-13 2023-03-17
0.0
None ??? ??? ??? ??? ??? ???
maddy is a composable, all-in-one mail server. Starting with version 0.2.0 and prior to version 0.6.3, maddy allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified username, it is accepted as is after checking the credentials for the authentication username. maddy 0.6.3 includes the fix for the bug. There are no known workarounds.
4 CVE-2023-27482 287 Bypass 2023-03-08 2023-03-15
0.0
None ??? ??? ??? ??? ??? ???
homeassistant is an open source home automation tool. A remotely exploitable vulnerability bypassing authentication for accessing the Supervisor API through Home Assistant has been discovered. This impacts all Home Assistant installation types that use the Supervisor 2023.01.1 or older. Installation types, like Home Assistant Container (for example Docker), or Home Assistant Core manually in a Python environment, are not affected. The issue has been mitigated and closed in Supervisor version 2023.03.1, which has been rolled out to all affected installations via the auto-update feature of the Supervisor. This rollout has been completed at the time of publication of this advisory. Home Assistant Core 2023.3.0 included mitigation for this vulnerability. Upgrading to at least that version is thus advised. In case one is not able to upgrade the Home Assistant Supervisor or the Home Assistant Core application at this time, it is advised to not expose your Home Assistant instance to the internet.
5 CVE-2023-25957 287 Bypass 2023-03-14 2023-03-21
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All Versions >= 1.16.4 < 1.17.2), Mendix SAML (Mendix 8 compatible) (All versions >= 2.2.0 < 2.2.3), Mendix SAML (Mendix 9 compatible, New Track) (All versions >= 3.1.9 < 3.2.5), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions >= 3.1.9 < 3.2.5). The affected versions of the module insufficiently verifies the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application.
6 CVE-2023-25931 287 2023-03-01 2023-03-09
0.0
None ??? ??? ??? ??? ??? ???
Medtronic identified that the Pelvic Health clinician apps, which are installed on the Smart Programmer mobile device, have a password vulnerability that requires a security update to fix. Not updating could potentially result in unauthorized control of the clinician therapy application, which has greater control over therapy parameters than the patient app. Changes still cannot be made outside of the established therapy parameters of the programmer. For unauthorized access to occur, an individual would need physical access to the Smart Programmer.
7 CVE-2023-25264 287 Bypass 2023-02-28 2023-03-07
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Docmosis Tornado prior to version 2.9.5. An unauthenticated attacker can bypass the authentication check filter completely by introducing a specially crafted request with relative path segments.
8 CVE-2023-24830 287 2023-01-30 2023-03-08
0.0
None ??? ??? ??? ??? ??? ???
Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This issue affects iotdb-web-workbench component: from 0.13.0 before 0.13.3.
9 CVE-2023-24093 287 2023-02-22 2023-03-03
0.0
None ??? ??? ??? ??? ??? ???
An access control issue in H3C A210-G A210-GV100R005 allows attackers to authenticate without a password.
10 CVE-2023-23857 287 2023-03-14 2023-03-16
0.0
None ??? ??? ??? ??? ??? ???
Due to missing authentication check, SAP NetWeaver AS for Java - version 7.50, allows an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and services across systems. On a successful exploitation, the attacker can read and modify some sensitive information but can also be used to lock up any element or operation of the system making that it unresponsive or unavailable.
11 CVE-2023-23612 287 2023-01-26 2023-02-02
0.0
None ??? ??? ??? ??? ??? ???
OpenSearch is an open source distributed and RESTful search engine. OpenSearch uses JWTs to store role claims obtained from the Identity Provider (IdP) when the authentication backend is SAML or OpenID Connect. There is an issue in how those claims are processed from the JWTs where the leading and trailing whitespace is trimmed, allowing users to potentially claim roles they are not assigned to if any role matches the whitespace-stripped version of the roles they are a member of. This issue is only present for authenticated users, and it requires either the existence of roles that match, not considering leading/trailing whitespace, or the ability for users to create said matching roles. In addition, the Identity Provider must allow leading and trailing spaces in role names. OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 are affected. Users are advised to upgrade to OpenSearch 1.3.8 or 2.5.0. There are no known workarounds for this issue.
12 CVE-2023-23493 287 2023-02-27 2023-03-08
0.0
None ??? ??? ??? ??? ??? ???
A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.2, macOS Monterey 12.6.3. An encrypted volume may be unmounted and remounted by a different user without prompting for the password.
13 CVE-2023-23460 287 Bypass 2023-02-15 2023-02-24
0.0
None ??? ??? ??? ??? ??? ???
Priority Web version 19.1.0.68, parameter manipulation on an unspecified end-point may allow authentication bypass.
14 CVE-2023-22964 287 Bypass 2023-01-20 2023-01-27
0.0
None ??? ??? ??? ??? ??? ???
Zoho ManageEngine ServiceDesk Plus MSP before 10611, and 13x before 13004, is vulnerable to authentication bypass when LDAP authentication is enabled.
15 CVE-2023-22501 287 2023-02-01 2023-02-09
0.0
None ??? ??? ??? ??? ??? ???
An authentication vulnerability was discovered in Jira Service Management Server and Data Center which allows an attacker to impersonate another user and gain access to a Jira Service Management instance under certain circumstances_._ With write access to a User Directory and outgoing email enabled on a Jira Service Management instance, an attacker could gain access to signup tokens sent to users with accounts that have never been logged into. Access to these tokens can be obtained in two cases: * If the attacker is included on Jira issues or requests with these users, or * If the attacker is forwarded or otherwise gains access to emails containing a “View Request” link from these users. Bot accounts are particularly susceptible to this scenario. On instances with single sign-on, external customer accounts can be affected in projects where anyone can create their own account.
16 CVE-2023-22334 287 +Info 2023-01-20 2023-01-26
0.0
None ??? ??? ??? ??? ??? ???
Use of password hash instead of password for authentication vulnerability in CONPROSYS HMI System (CHS) Ver.3.4.5 and earlier allows a remote authenticated attacker to obtain user credentials information via a man-in-the-middle attack.
17 CVE-2023-22303 287 Bypass +Info 2023-01-17 2023-01-24
0.0
None ??? ??? ??? ??? ??? ???
TP-Link SG105PE firmware prior to 'TL-SG105PE(UN) 1.0_1.0.0 Build 20221208' contains an authentication bypass vulnerability. Under the certain conditions, an attacker may impersonate an administrator of the product. As a result, information may be obtained and/or the product's settings may be altered with the privilege of the administrator.
18 CVE-2023-21460 287 2023-03-16 2023-03-23
0.0
None ??? ??? ??? ??? ??? ???
Improper authentication in SecSettings prior to SMR Mar-2023 Release 1 allows attacker to reset the setting.
19 CVE-2023-21437 287 2023-02-09 2023-02-21
0.0
None ??? ??? ??? ??? ??? ???
Improper access control vulnerability in Phone application prior to SMR Feb-2023 Release 1 allows local attackers to access sensitive information via implicit broadcast.
20 CVE-2023-21425 287 2023-02-09 2023-02-21
0.0
None ??? ??? ??? ??? ??? ???
Improper access control vulnerability in telecom application prior to SMR JAN-2023 Release 1 allows local attackers to get sensitive information.
21 CVE-2023-20924 287 Bypass 2023-01-26 2023-02-01
0.0
None ??? ??? ??? ??? ??? ???
In (TBD) of (TBD), there is a possible way to bypass the lockscreen due to Biometric Auth Failure. This could lead to local escalation of privilege with physical access to the device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-240428519References: N/A
22 CVE-2023-20012 287 DoS Exec Code Bypass 2023-02-23 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability is due to the improper implementation of the password validation function. An attacker could exploit this vulnerability by logging in to the console port on an affected device. A successful exploit could allow the attacker to bypass authentication and execute a limited set of commands local to the FEX, which could cause a device reboot and denial of service (DoS) condition.
23 CVE-2023-1464 287 2023-03-17 2023-03-23
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability, which was classified as critical, was found in SourceCodester Medicine Tracker System 1.0. This affects an unknown part of the file Users.php?f=save_user. The manipulation of the argument firstname/middlename/lastname/username/password leads to improper authentication. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-223311.
24 CVE-2023-1460 287 2023-03-17 2023-03-23
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability was found in SourceCodester Online Pizza Ordering System 1.0. It has been classified as critical. This affects an unknown part of the file admin/ajax.php?action=save_user of the component Password Change Handler. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The identifier VDB-223305 was assigned to this vulnerability.
25 CVE-2023-1327 287 Bypass 2023-03-14 2023-03-21
0.0
None ??? ??? ??? ??? ??? ???
Netgear RAX30 (AX2400), prior to version 1.0.6.74, was affected by an authentication bypass vulnerability, allowing an unauthenticated attacker to gain administrative access to the device's web management interface by resetting the admin password.
26 CVE-2023-1065 287 2023-02-28 2023-03-10
0.0
None ??? ??? ??? ??? ??? ???
This vulnerability in the Snyk Kubernetes Monitor can result in irrelevant data being posted to a Snyk Organization, which could in turn obfuscate other, relevant, security issues. It does not expose the user of the integration to any direct security risk and no user data can be leaked. To exploit the vulnerability the attacker does not need to be authenticated to Snyk but does need to know the target's Integration ID (which may or may not be the same as the Organization ID, although this is an unpredictable UUID in either case).
27 CVE-2023-0905 287 2023-02-18 2023-02-27
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability classified as critical has been found in SourceCodester Employee Task Management System 1.0. Affected is an unknown function of the file changePasswordForEmployee.php. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221454 is the identifier assigned to this vulnerability.
28 CVE-2023-0346 287 2023-03-13 2023-03-16
0.0
None ??? ??? ??? ??? ??? ???
Akuvox E11 cloud login is performed through an unencrypted HTTP connection. An attacker could gain access to the Akuvox cloud and device if the MAC address of a device if known.
29 CVE-2023-0311 287 2023-01-15 2023-01-23
0.0
None ??? ??? ??? ??? ??? ???
Improper Authentication in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
30 CVE-2023-0228 287 2023-03-02 2023-03-10
0.0
None ??? ??? ??? ??? ??? ???
Improper Authentication vulnerability in ABB Symphony Plus S+ Operations.This issue affects Symphony Plus S+ Operations: from 2.X through 2.1 SP2, 2.2, from 3.X through 3.3 SP1, 3.3 SP2.
31 CVE-2023-0105 287 2023-01-13 2023-01-23
0.0
None ??? ??? ??? ??? ??? ???
A flaw was found in Keycloak. This flaw allows impersonation and lockout due to the email trust not being handled correctly in Keycloak. An attacker can shadow other users with the same email and lockout or impersonate them.
32 CVE-2022-48294 287 2023-02-09 2023-02-17
0.0
None ??? ??? ??? ??? ??? ???
The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality.
33 CVE-2022-48254 287 Bypass 2023-02-27 2023-03-07
0.0
None ??? ??? ??? ??? ??? ???
There is a data processing error vulnerability in Leia-B29 2.0.0.49(M03). Successful exploitation could bypass lock screen authentication.
34 CVE-2022-48195 287 2022-12-31 2023-01-09
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.
35 CVE-2022-47700 287 2023-01-31 2023-02-08
0.0
None ??? ??? ??? ??? ??? ???
COMFAST (Shenzhen Sihai Zhonglian Network Technology Co., Ltd) CF-WR623N Router firmware V2.3.0.1 and before is vulnerable to Incorrect Access Control. Improper authentication allows requests to be made to back-end scripts without a valid session or authentication.
36 CVE-2022-47633 287 Bypass 2022-12-23 2023-01-04
0.0
None ??? ??? ??? ??? ??? ???
An image signature validation bypass vulnerability in Kyverno 1.8.3 and 1.8.4 allows a malicious image registry (or a man-in-the-middle attacker) to inject unsigned arbitrary container images into a protected Kubernetes cluster. This is fixed in 1.8.5. This has been fixed in 1.8.5 and mitigations are available for impacted releases.
37 CVE-2022-46829 287 2022-12-08 2022-12-12
0.0
None ??? ??? ??? ??? ??? ???
In JetBrains JetBrains Gateway before 2022.3 a client could connect without a valid token if the host consented.
38 CVE-2022-46774 287 2023-03-15 2023-03-19
0.0
None ??? ??? ??? ??? ??? ???
IBM Manage Application 8.8.0 and 8.9.0 in the IBM Maximo Application Suite is vulnerable to incorrect default permissions which could give access to a user to actions that they should not have access to. IBM X-Force ID: 242953.
39 CVE-2022-46773 287 Bypass 2023-03-15 2023-03-19
0.0
None ??? ??? ??? ??? ??? ???
IBM Robotic Process Automation 21.0.0 - 21.0.7 and 23.0.0 is vulnerable to client-side validation bypass for credential pools. Invalid credential pools may be created as a result. IBM X-Force ID: 242951.
40 CVE-2022-46316 287 2022-12-20 2022-12-24
0.0
None ??? ??? ??? ??? ??? ???
A thread security vulnerability exists in the authentication process. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability.
41 CVE-2022-46313 287 2022-12-20 2022-12-24
0.0
None ??? ??? ??? ??? ??? ???
The sensor privacy module has an authentication vulnerability. Successful exploitation of this vulnerability may cause unavailability of the smartphone's camera and microphone.
42 CVE-2022-46172 287 2022-12-28 2023-01-06
0.0
None ??? ??? ??? ??? ??? ???
authentik is an open-source Identity provider focused on flexibility and versatility. In versions prior to 2022.10.4, and 2022.11.4, any authenticated user can create an arbitrary number of accounts through the default flows. This would circumvent any policy in a situation where it is undesirable for users to create new accounts by themselves. This may also affect other applications as these new basic accounts would exist throughout the SSO infrastructure. By default the newly created accounts cannot be logged into as no password reset exists by default. However password resets are likely to be enabled by most installations. This vulnerability pertains to the user context used in the default-user-settings-flow, /api/v3/flows/instances/default-user-settings-flow/execute/. This issue has been fixed in versions 2022.10.4 and 2022.11.4.
43 CVE-2022-46170 287 2022-12-22 2022-12-29
0.0
None ??? ??? ??? ??? ??? ???
CodeIgniter is a PHP full-stack web framework. When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to `DatabaseHandler`, `MemcachedHandler`, or `RedisHandler`, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). This issue has been patched, please upgrade to version 4.2.11 or later. As a workaround, use only one session cookie.
44 CVE-2022-46146 287 Bypass 2022-11-29 2023-02-01
0.0
None ??? ??? ??? ??? ??? ???
Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.
45 CVE-2022-46145 287 2022-12-02 2022-12-06
0.0
None ??? ??? ??? ??? ??? ???
authentik is an open-source identity provider. Versions prior to 2022.11.2 and 2022.10.2 are vulnerable to unauthorized user creation and potential account takeover. With the default flows, unauthenticated users can create new accounts in authentik. If a flow exists that allows for email-verified password recovery, this can be used to overwrite the email address of admin accounts and take over their accounts. authentik 2022.11.2 and 2022.10.2 fix this issue. As a workaround, a policy can be created and bound to the `default-user-settings-flow flow` with the contents `return request.user.is_authenticated`.
46 CVE-2022-45933 287 2022-11-27 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure."
47 CVE-2022-45877 287 2022-12-08 2022-12-12
0.0
None ??? ??? ??? ??? ??? ???
OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks.
48 CVE-2022-45434 287 Bypass 2022-12-27 2023-01-05
0.0
None ??? ??? ??? ??? ??? ???
Some Dahua software products have a vulnerability of unauthenticated un-throttled ICMP requests on remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could exploit the victim server to launch ICMP request attack to the designated target host.
49 CVE-2022-45433 287 Bypass 2022-12-27 2023-01-05
0.0
None ??? ??? ??? ??? ??? ???
Some Dahua software products have a vulnerability of unauthenticated traceroute host from remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could get the traceroute results.
50 CVE-2022-45432 287 Bypass 2022-12-27 2023-01-05
0.0
None ??? ??? ??? ??? ??? ???
Some Dahua software products have a vulnerability of unauthenticated search for devices. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated search for devices in range of IPs from remote DSS Server.
Total number of vulnerabilities : 2966   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.