NETGEAR DGN2200v1 devices before v1.0.0.60 mishandle HTTPd authentication (aka PSV-2020-0363, PSV-2020-0364, and PSV-2020-0365).
Source: MITRE
Max CVSS
8.8
EPSS Score
0.07%
Published
2020-12-30
Updated
2020-12-31
A flaw was found in ovirt-engine 4.4.3 and earlier allowing an authenticated user to read other users' personal information, including name, email and public SSH key.
Source: Red Hat, Inc.
Max CVSS
6.5
EPSS Score
0.07%
Published
2020-12-21
Updated
2020-12-22
An issue was discovered in the LogMein LastPass Password Manager (aka com.lastpass.ilastpass) app 4.8.11.2403 for iOS. The password authentication for unlocking can be bypassed by forcing the authentication result to be true through runtime manipulation. In other words, an attacker could authenticate with an arbitrary password. NOTE: the vendor has indicated that this is not an attack of interest within the context of their threat model, which excludes jailbroken devices
Source: MITRE
Max CVSS
5.7
EPSS Score
0.12%
Published
2020-12-12
Updated
2024-05-17
An issue was discovered in the LogMein LastPass Password Manager (aka com.lastpass.ilastpass) app 4.8.11.2403 for iOS. The PIN authentication for unlocking can be bypassed by forcing the authentication result to be true through runtime manipulation. In other words, an attacker could authenticate with an arbitrary PIN. NOTE: the vendor has indicated that this is not an attack of interest within the context of their threat model, which excludes jailbroken devices
Source: MITRE
Max CVSS
5.7
EPSS Score
0.12%
Published
2020-12-12
Updated
2024-05-17
In the Macally WIFISD2-2A82 Media and Travel Router 2.000.010, the Guest user is able to reset its own password. This process has a vulnerability which can be used to take over the administrator account and results in shell access. As the admin user may read the /etc/shadow file, the password hashes of each user (including root) can be dumped. The root hash can be cracked easily which results in a complete system compromise.
Source: MITRE
Max CVSS
9.0
EPSS Score
6.97%
Published
2020-12-14
Updated
2020-12-15
Sympa before 6.2.59b.2 allows remote attackers to obtain full SOAP API access by sending any arbitrary string (except one from an expired cookie) as the cookie value to authenticateAndRun.
Source: MITRE
Max CVSS
4.3
EPSS Score
0.27%
Published
2020-12-10
Updated
2022-04-26
An issue was discovered on Western Digital My Cloud OS 5 devices before 5.07.118. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to gain access to the device.
Source: MITRE
Max CVSS
9.8
EPSS Score
0.32%
Published
2020-12-12
Updated
2022-08-06
The Estil Hill Lock Password Manager Safe app 2.3 for iOS has a *#06#* backdoor password. An attacker with physical access can unlock the password manager without knowing the master password set by the user.
Source: MITRE
Max CVSS
4.6
EPSS Score
0.10%
Published
2020-11-30
Updated
2021-07-21
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. It is possible to elevate the privilege of a CLI user (to full administrative access) by using the password !j@l#y$z%x6x7q8c9z) for the enable command.
Source: MITRE
Max CVSS
9.0
EPSS Score
0.10%
Published
2020-11-29
Updated
2021-07-21
An issue was discovered on Fujitsu Eternus Storage DX200 S4 devices through 2020-11-25. After logging into the portal as a root user (using any web browser), the portal can be accessed with root privileges when the URI cgi-bin/csp?cspid={XXXXXXXXXX}&csppage=cgi_PgOverview&csplang=en is visited from a different web browser.
Source: MITRE
Max CVSS
10.0
EPSS Score
41.09%
Published
2020-11-30
Updated
2020-12-03
An issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie, because of insufficient validation of URI paths.
Source: MITRE
Max CVSS
9.8
EPSS Score
0.72%
Published
2020-12-01
Updated
2022-04-26
An issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie. (In addition, an upload endpoint could then be used by an authenticated administrator to upload executable PHP scripts.)
Source: MITRE
Max CVSS
9.8
EPSS Score
0.72%
Published
2020-12-01
Updated
2022-04-26
On Western Digital My Cloud OS 5 devices before 5.06.115, the NAS Admin dashboard has an authentication bypass vulnerability that could allow an unauthenticated user to execute privileged commands on the device.
Source: MITRE
Max CVSS
9.8
EPSS Score
0.72%
Published
2020-12-01
Updated
2022-04-26
Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.
Source: MITRE
Max CVSS
5.3
EPSS Score
0.31%
Published
2020-11-23
Updated
2021-07-21
ask_password in Tomb 2.0 through 2.7 returns a warning when pinentry-curses is used and $DISPLAY is non-empty, causing affected users' files to be encrypted with "tomb {W] Detected DISPLAY, but only pinentry-curses is found." as the encryption key.
Source: MITRE
Max CVSS
9.8
EPSS Score
0.19%
Published
2020-11-13
Updated
2020-12-02
Barco wePresent WiPG-1600W devices allow Authentication Bypass. Affected Version(s): 2.5.1.8. The Barco wePresent WiPG-1600W web interface does not use session cookies for tracking authenticated sessions. Instead, the web interface uses a "SEID" token that is appended to the end of URLs in GET requests. Thus the "SEID" would be exposed in web proxy logs and browser history. An attacker that is able to capture the "SEID" and originate requests from the same IP address (via a NAT device or web proxy) would be able to access the user interface of the device without having to know the credentials.
Source: MITRE
Max CVSS
9.8
EPSS Score
0.42%
Published
2020-11-24
Updated
2021-07-21
In SonarQube 8.4.2.36762, an external attacker can achieve authentication bypass through SonarScanner. With an empty value for the -D sonar.login option, anonymous authentication is forced. This allows creating and overwriting public and private projects via the /api/ce/submit endpoint.
Source: MITRE
Max CVSS
5.3
EPSS Score
0.10%
Published
2020-11-02
Updated
2020-11-17
A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.
Source: Red Hat, Inc.
Max CVSS
10.0
EPSS Score
0.18%
Published
2020-12-18
Updated
2020-12-28
Use of an undocumented user in BASETech GE-131 BT-1837836 firmware 20180921 allows remote attackers to view the video stream.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.28%
Published
2020-11-17
Updated
2020-12-01
OpenSIS Community Edition through 7.6 is affected by incorrect access controls for the file ResetUserInfo.php that allow an unauthenticated attacker to change the password of arbitrary users.
Source: MITRE
Max CVSS
7.5
EPSS Score
0.16%
Published
2020-12-04
Updated
2021-07-21
Emerson Rosemount X-STREAM Gas AnalyzerX-STREAM enhanced XEGP, XEGK, XEFD, XEXF – all revisions, The affected products are vulnerable to improper authentication for accessing log and backup data, which could allow an attacker with a specially crafted URL to obtain access to sensitive information.
Source: ICS-CERT
Max CVSS
7.5
EPSS Score
0.16%
Published
2020-12-21
Updated
2020-12-22
The Magic Home Pro application 1.5.1 for Android allows Authentication Bypass. The security control that the application currently has in place is a simple Username and Password authentication function. Using enumeration, an attacker is able to forge a User specific token without the need for correct password to gain access to the mobile application as that victim user.
Source: MITRE
Max CVSS
7.5
EPSS Score
0.33%
Published
2020-12-17
Updated
2020-12-22
An issue was discovered in OpenStack blazar-dashboard before 1.3.1, 2.0.0, and 3.0.0. A user allowed to access the Blazar dashboard in Horizon may trigger code execution on the Horizon host as the user the Horizon service runs under (because the Python eval function is used). This may result in Horizon host unauthorized access and further compromise of the Horizon service. All setups using the Horizon dashboard with the blazar-dashboard plugin are affected.
Source: MITRE
Max CVSS
9.9
EPSS Score
0.23%
Published
2020-10-16
Updated
2020-10-27
Certain NETGEAR devices are affected by authentication bypass. This affects GS110EMX before 1.0.1.7, GS810EMX before 1.7.1.3, XS512EM before 1.0.1.3, and XS724EM before 1.0.1.3.
Source: MITRE
Max CVSS
8.8
EPSS Score
0.07%
Published
2020-10-09
Updated
2021-07-21
SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.
Source: SAP SE
Max CVSS
5.5
EPSS Score
0.05%
Published
2020-12-09
Updated
2020-12-10
817 vulnerabilities found
1 2 3 4 5 6 ...... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!