Total
3371 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-0138 | 2 Debian, Haxx | 3 Debian Linux, Curl, Libcurl | 2024-11-21 | 6.4 MEDIUM | N/A |
The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015. | |||||
CVE-2014-0132 | 1 Fedoraproject | 1 389 Directory Server | 2024-11-21 | 6.5 MEDIUM | N/A |
The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind. | |||||
CVE-2014-0121 | 2 Hawt, Redhat | 2 Hawtio, Jboss Fuse | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The admin terminal in Hawt.io does not require authentication, which allows remote attackers to execute arbitrary commands via the k parameter. | |||||
CVE-2014-0097 | 1 Vmware | 1 Spring Security | 2024-11-21 | 7.5 HIGH | 7.3 HIGH |
The ActiveDirectoryLdapAuthenticator in Spring Security 3.2.0 to 3.2.1 and 3.1.0 to 3.1.5 does not check the password length. If the directory allows anonymous binds then it may incorrectly authenticate a user who supplies an empty password. | |||||
CVE-2014-0090 | 1 Theforeman | 1 Foreman | 2024-11-21 | 6.8 MEDIUM | N/A |
Session fixation vulnerability in Foreman before 1.4.2 allows remote attackers to hijack web sessions via the session id cookie. | |||||
CVE-2014-0074 | 1 Apache | 1 Shiro | 2024-11-21 | 7.5 HIGH | N/A |
Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password. | |||||
CVE-2014-0056 | 2 Canonical, Openstack | 2 Ubuntu Linux, Neutron | 2024-11-21 | 2.1 LOW | N/A |
The l3-agent in OpenStack Neutron 2012.2 before 2013.2.3 does not check the tenant id when creating ports, which allows remote authenticated users to plug ports into the routers of arbitrary tenants via the device id in a port-create command. | |||||
CVE-2014-0015 | 1 Haxx | 2 Curl, Libcurl | 2024-11-21 | 4.0 MEDIUM | N/A |
cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request. | |||||
CVE-2013-7465 | 1 Icecoldapps | 1 Servers Ultimate | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Ice Cold Apps Servers Ultimate 6.0.2(12) does not require authentication for TELNET, SSH, or FTP, which allows remote attackers to execute arbitrary code by uploading PHP scripts. | |||||
CVE-2013-7379 | 1 Ucdok | 1 Tomato | 2024-11-21 | 6.8 MEDIUM | N/A |
The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key. | |||||
CVE-2013-7366 | 1 Sap | 1 Software Deployment Manager | 2024-11-21 | 5.0 MEDIUM | N/A |
The SAP Software Deployment Manager (SDM), in certain unspecified conditions, allows remote attackers to cause a denial of service via vectors related to failed authentications. | |||||
CVE-2013-7322 | 1 Nongnu | 1 Oath Toolkit | 2024-11-21 | 4.9 MEDIUM | N/A |
usersfile.c in liboath in OATH Toolkit before 2.4.1 does not properly handle lines containing an invalid one-time-password (OTP) type and a user name in /etc/users.oath, which causes the wrong line to be updated when invalidating an OTP and allows context-dependent attackers to conduct replay attacks, as demonstrated by a commented out line when using libpam-oath. | |||||
CVE-2013-7302 | 2 Drupal, Ubercart | 2 Drupal, Ubercart | 2024-11-21 | 6.8 MEDIUM | N/A |
Session fixation vulnerability in the Ubercart module 6.x-2.x before 6.x-2.13 and 7.x-3.x before 7.x-3.6 for Drupal, when the "Log in new customers after checkout" option is enabled, allows remote attackers to hijack web sessions by leveraging knowledge of the original session ID. | |||||
CVE-2013-7292 | 1 Vasco | 1 Identikey Authentication Server | 2024-11-21 | 3.5 LOW | N/A |
VASCO IDENTIKEY Authentication Server (IAS) 3.4.x allows remote authenticated users to bypass Active Directory (AD) authentication by entering only a DIGIPASS one-time password, instead of the intended combination of this one-time password and a multiple-time AD password. | |||||
CVE-2013-7282 | 1 Nisuta | 4 Ns-wir150ne, Ns-wir150ne Firmware, Ns-wir300n and 1 more | 2024-11-21 | 10.0 HIGH | N/A |
The management web interface on the Nisuta NS-WIR150NE router with firmware 5.07.41 and Nisuta NS-WIR300N router with firmware 5.07.36_NIS01 allows remote attackers to bypass authentication via a "Cookie: :language=en" HTTP header. | |||||
CVE-2013-7239 | 1 Memcached | 1 Memcached | 2024-11-21 | 4.8 MEDIUM | N/A |
memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials. | |||||
CVE-2013-7183 | 1 Seowonintech | 1 Swc-9100 | 2024-11-21 | 7.8 HIGH | N/A |
cgi-bin/reboot.cgi on Seowon Intech SWC-9100 routers allows remote attackers to (1) cause a denial of service (reboot) via a default_reboot action or (2) reset all configuration values via a factory_default action. | |||||
CVE-2013-7137 | 1 Burden Project | 1 Burden | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The "remember me" functionality in login.php in Burden before 1.8.1 allows remote attackers to bypass authentication and gain privileges by setting the burden_user_rememberme cookie to 1. | |||||
CVE-2013-7093 | 1 Sap | 1 Network Interface Router | 2024-11-21 | 5.0 MEDIUM | N/A |
SAP Network Interface Router (SAProuter) 39.3 SP4 allows remote attackers to bypass authentication and modify the configuration via unspecified vectors. | |||||
CVE-2013-7051 | 1 Dlink | 2 Dir-100, Dir-100 Firmware | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
D-Link DIR-100 4.03B07: cli.cgi security bypass due to failure to check authentication parameters |