Show filters
1,099 Total Results
Displaying 331-340 of 1,099
Sort by:
Attacker Value
Unknown

CVE-2023-4699

Disclosure Date: November 06, 2023 (last updated February 25, 2025)
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC-F Series CPU modules, MELSEC iQ-F Series, MELSEC iQ-R series CPU modules, MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series, MELSEC-L series, Mitsubishi Electric CNC M800V/M80V series, Mitsubishi Electric CNC M800/M80/E80 series and Mitsubishi Electric CNC M700V/M70V/E70 series allows a remote unauthenticated attacker to execute arbitrary commands by sending specific packets to the affected products. This could lead to disclose or tamper with information by reading or writing control programs, or cause a denial-of-service (DoS) condition on the products by resetting the memory contents of the products to factory settings or resetting the products remotely.
Attacker Value
Unknown

CVE-2023-46381

Disclosure Date: November 04, 2023 (last updated February 25, 2025)
LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI.
Attacker Value
Unknown

CVE-2022-43555

Disclosure Date: November 03, 2023 (last updated February 25, 2025)
Ivanti Avalanche Printer Device Service Missing Authentication Local Privilege Escalation Vulnerability
Attacker Value
Unknown

CVE-2022-43554

Disclosure Date: November 03, 2023 (last updated February 25, 2025)
Ivanti Avalanche Smart Device Service Missing Authentication Local Privilege Escalation Vulnerability
Attacker Value
Unknown

CVE-2023-41351

Disclosure Date: November 03, 2023 (last updated February 25, 2025)
Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of authentication bypass, which allows an unauthenticated remote attacker to bypass the authentication mechanism to log in to the device by an alternative URL. This makes it possible for unauthenticated remote attackers to log in as any existing users, such as an administrator, to perform arbitrary system operations or disrupt service.
Attacker Value
Unknown

CVE-2023-46249

Disclosure Date: October 31, 2023 (last updated February 25, 2025)
authentik is an open-source Identity Provider. Prior to versions 2023.8.4 and 2023.10.2, when the default admin user has been deleted, it is potentially possible for an attacker to set the password of the default admin user without any authentication. authentik uses a blueprint to create the default admin user, which can also optionally set the default admin users' password from an environment variable. When the user is deleted, the `initial-setup` flow used to configure authentik after the first installation becomes available again. authentik 2023.8.4 and 2023.10.2 fix this issue. As a workaround, ensure the default admin user (Username `akadmin`) exists and has a password set. It is recommended to use a very strong password for this user, and store it in a secure location like a password manager. It is also possible to deactivate the user to prevent any logins as akadmin.
Attacker Value
Unknown

CVE-2023-46978

Disclosure Date: October 31, 2023 (last updated February 25, 2025)
TOTOLINK X6000R V9.4.0cu.852_B20230719 is vulnerable to Incorrect Access Control.Attackers can reset login password & WIFI passwords without authentication.
Attacker Value
Unknown

CVE-2023-42845

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. Photos in the Hidden Photos Album may be viewed without authentication.
Attacker Value
Unknown

CVE-2023-40401

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
The issue was addressed with additional permissions checks. This issue is fixed in macOS Ventura 13.6.1. An attacker may be able to access passkeys without authentication.
Attacker Value
Unknown

CVE-2023-45851

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication.  This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device