Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
High
CVE-2020-10923
Disclosure Date: July 28, 2020 (last updated February 21, 2025)
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000. A crafted UPnP message can be used to bypass authentication. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9642.
1
Attacker Value
Unknown
CVE-2021-43175
Disclosure Date: December 07, 2021 (last updated February 23, 2025)
The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 exposes an API router that accepts a username, password, and action that routes to other PHP files that implement the various API functions. Vulnerable versions of GOautodial validate the username and password incorrectly, allowing the caller to specify any values for these parameters and successfully authenticate. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
0
Attacker Value
Unknown
CVE-2021-3547
Disclosure Date: July 12, 2021 (last updated February 23, 2025)
OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.
0
Attacker Value
Unknown
CVE-2020-15077
Disclosure Date: June 04, 2021 (last updated February 22, 2025)
OpenVPN Access Server 2.8.7 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
0
Attacker Value
Unknown
CVE-2020-15078
Disclosure Date: April 26, 2021 (last updated February 22, 2025)
OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
0
Attacker Value
Unknown
CVE-2021-21403
Disclosure Date: March 26, 2021 (last updated February 22, 2025)
In github.com/kongchuanhujiao/server before version 1.3.21 there is an authentication Bypass by Primary Weakness vulnerability. All users are impacted. This is fixed in version 1.3.21.
0
Attacker Value
Unknown
CVE-2020-14359
Disclosure Date: February 23, 2021 (last updated February 22, 2025)
A vulnerability was found in all versions of Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) an attacker can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.
0
Attacker Value
Unknown
CVE-2020-24683
Disclosure Date: December 15, 2020 (last updated February 22, 2025)
The affected versions of S+ Operations (version 2.1 SP1 and earlier) used an approach for user authentication which relies on validation at the client node (client-side authentication). This is not as secure as having the server validate a client application before allowing a connection. Therefore, if the network communication or endpoints for these applications are not protected, unauthorized actors can bypass authentication and make unauthorized connections to the server application.
0
Attacker Value
Unknown
CVE-2020-15787
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
A vulnerability has been identified in SIMATIC HMI Unified Comfort Panels (All versions <= V16). Affected devices insufficiently validate authentication attempts as the information given can be truncated to match only a set number of characters versus the whole provided string. This could allow a remote attacker to discover user passwords and obtain access to the Sm@rt Server via a brute-force attack.
0
Attacker Value
Unknown
CVE-2020-10126
Disclosure Date: August 21, 2020 (last updated February 22, 2025)
NCR SelfServ ATMs running APTRA XFS 05.01.00 do not properly validate softare updates for the bunch note acceptor (BNA), enabling an attacker with physical access to internal ATM components to restart the host computer and execute arbitrary code with SYSTEM privileges because while booting, the update process looks for CAB archives on removable media and executes a specific file without first validating the signature of the CAB archive.
0