Total
2926 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2012-4392 | 1 Owncloud | 1 Owncloud | 2012-09-12 | 7.5 HIGH | N/A |
index.php in ownCloud 4.0.7 does not properly validate the oc_token cookie, which allows remote attackers to bypass authentication via a crafted oc_token cookie value. | |||||
CVE-2012-4604 | 1 Websense | 1 Websense Web Security | 2012-08-23 | 4.3 MEDIUM | N/A |
The TRITON management console in Websense Web Security before 7.6 Hotfix 24 allows remote attackers to bypass authentication and read arbitrary reports via a crafted uid field, in conjunction with a crafted userRoles field, in a cookie, as demonstrated by a request to explorer_wse/favorites.exe. | |||||
CVE-2009-5116 | 1 Mcafee | 1 Linuxshield | 2012-08-22 | 6.5 MEDIUM | N/A |
McAfee LinuxShield 1.5.1 and earlier does not properly implement client authentication, which allows remote authenticated users to obtain Admin access to the statistics server by leveraging a client account. | |||||
CVE-2011-5100 | 1 Mcafee | 1 Firewall Reporter | 2012-08-22 | 7.5 HIGH | N/A |
The web interface in McAfee Firewall Reporter before 5.1.0.13 does not properly implement cookie authentication, which allows remote attackers to obtain access, and disable anti-virus functionality, via an HTTP request. | |||||
CVE-2012-4581 | 1 Mcafee | 2 Email And Web Security, Email Gateway | 2012-08-22 | 6.8 MEDIUM | N/A |
McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not disable the server-side session token upon the closing of the Management Console/Dashboard, which makes it easier for remote attackers to hijack sessions by capturing a session cookie and then modifying the response to a login attempt, related to a "Logout Failure" issue. | |||||
CVE-2011-3620 | 1 Apache | 1 Qpid | 2012-08-13 | 7.5 HIGH | N/A |
Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username. | |||||
CVE-2012-3473 | 1 Ushahidi | 1 Ushahidi Platform | 2012-08-13 | 6.4 MEDIUM | N/A |
The (1) reports API and (2) administration feature in the comments API in the Ushahidi Platform before 2.5 do not require authentication, which allows remote attackers to generate reports and organize comments via API functions. | |||||
CVE-2012-3472 | 1 Ushahidi | 1 Ushahidi Platform | 2012-08-13 | 6.4 MEDIUM | N/A |
The email API in application/libraries/api/MY_Email_Api_Object.php in the Ushahidi Platform before 2.5 does not require authentication, which allows remote attackers to list, delete, or organize messages via a GET request. | |||||
CVE-2012-2963 | 1 Breakingpointsystems | 2 Breakingpoint Storm Appliance, Breakingpoint Storm Appliance Ctm | 2012-08-12 | 5.0 MEDIUM | N/A |
The administrative interface in the embedded web server on the BreakingPoint Storm appliance before 3.0 does not require authentication for the gwt/BugReport script, which allows remote attackers to obtain sensitive information by downloading a .tgz file. | |||||
CVE-2012-2498 | 1 Cisco | 1 Anyconnect Secure Mobility Client | 2012-08-06 | 4.0 MEDIUM | N/A |
Cisco AnyConnect Secure Mobility Client 3.0 through 3.0.08066 does not ensure that authentication makes use of a legitimate certificate, which allows user-assisted man-in-the-middle attackers to spoof servers via a crafted certificate, aka Bug ID CSCtz29197. | |||||
CVE-2012-3885 | 1 Airdroid | 1 Airdroid | 2012-07-27 | 7.5 HIGH | N/A |
The default configuration of AirDroid 1.0.4 beta uses a four-character alphanumeric password, which makes it easier for remote attackers to obtain access via a brute-force attack. | |||||
CVE-2012-3884 | 1 Airdroid | 1 Airdroid | 2012-07-26 | 5.0 MEDIUM | N/A |
AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote attackers to obtain access by sniffing the local wireless network and then replaying the authentication data. | |||||
CVE-2012-0301 | 1 Symantec | 1 Message Filter | 2012-07-06 | 5.4 MEDIUM | N/A |
Session fixation vulnerability in Brightmail Control Center in Symantec Message Filter 6.3 allows remote attackers to hijack web sessions via unspecified vectors. | |||||
CVE-2009-0695 | 1 Dell | 1 Wyse Device Manager | 2012-06-25 | 7.5 HIGH | N/A |
hagent.exe in Wyse Device Manager (WDM) 4.7.x does not require authentication for commands, which allows remote attackers to obtain management access via a crafted query, as demonstrated by a V52 query that triggers a power-off action. | |||||
CVE-2012-0717 | 1 Ibm | 1 Websphere Application Server | 2012-06-20 | 2.6 LOW | N/A |
IBM WebSphere Application Server 7.0 before 7.0.0.23, when a certain SSLv2 configuration with client authentication is used, allows remote attackers to bypass X.509 client-certificate authentication via unspecified vectors. | |||||
CVE-2012-2606 | 1 Bradfordnetworks | 2 Network Sentry Appliance, Network Sentry Appliance Software | 2012-06-13 | 5.0 MEDIUM | N/A |
The agent in Bradford Network Sentry before 5.3.3 does not require authentication for messages, which allows remote attackers to trigger the display of arbitrary text on a workstation via a crafted packet to UDP port 4567, as demonstrated by a replay attack. | |||||
CVE-2009-2070 | 1 Opera | 1 Opera Browser | 2012-06-07 | 6.8 MEDIUM | N/A |
Opera displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle attackers to spoof an arbitrary https site by letting a browser obtain a valid certificate from this site during one request, and then sending the browser a crafted 502 response page upon a subsequent request. | |||||
CVE-2012-0675 | 1 Apple | 2 Mac Os X, Mac Os X Server | 2012-05-29 | 4.3 MEDIUM | N/A |
Time Machine in Apple Mac OS X before 10.7.4 does not require continued use of SRP-based authentication after this authentication method is first used, which allows remote attackers to read Time Capsule credentials by spoofing the backup volume. | |||||
CVE-2011-4022 | 1 Cisco | 1 Intrusion Prevention System | 2012-05-10 | 5.0 MEDIUM | N/A |
The sensor in Cisco Intrusion Prevention System (IPS) 7.0 and 7.1 allows remote attackers to cause a denial of service (file-handle exhaustion and mainApp hang) by making authentication attempts that exceed the configured limit, aka Bug ID CSCto51204. | |||||
CVE-2009-5076 | 1 Creloaded | 1 Cre Loaded | 2012-04-26 | 7.5 HIGH | N/A |
CRE Loaded before 6.2.14, and possibly other versions before 6.3.x, allows remote attackers to bypass authentication and gain administrator privileges via a request with (1) login.php or (2) password_forgotten.php appended as the PATH_INFO, which bypasses a check that uses PHP_SELF, which is not properly handled by (a) includes/application_top.php and (b) admin/includes/application_top.php, as exploited in the wild in 2009. |