Total
3371 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2013-4982 | 1 Avtech | 2 Avn801 Dvr, Avn801 Dvr Firmware | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
AVTECH AVN801 DVR has a security bypass via the administration login captcha | |||||
CVE-2013-4976 | 1 Hikvision | 2 Ds-2cd7153-e, Ds-2cd7153-e Firmware | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Hikvision DS-2CD7153-E IP Camera has security bypass via hardcoded credentials | |||||
CVE-2013-4966 | 1 Puppet | 1 Puppet Enterprise | 2024-11-21 | 6.4 MEDIUM | N/A |
The master external node classification script in Puppet Enterprise before 3.2.0 does not verify the identity of consoles, which allows remote attackers to create arbitrary classifications on the master by spoofing a console. | |||||
CVE-2013-4965 | 1 Puppet | 1 Puppet Enterprise | 2024-11-21 | 5.0 MEDIUM | N/A |
Puppet Enterprise before 3.1.0 does not properly restrict the number of authentication attempts by a console account, which makes it easier for remote attackers to bypass intended access restrictions via a brute-force attack. | |||||
CVE-2013-4958 | 1 Puppet | 1 Puppet Enterprise | 2024-11-21 | 6.9 MEDIUM | N/A |
Puppet Enterprise before 3.0.1 does not use a session timeout, which makes it easier for attackers to gain privileges by leveraging an unattended workstation. | |||||
CVE-2013-4877 | 1 Verizon | 1 Wireless Network Extender | 2024-11-21 | 2.6 LOW | N/A |
The Verizon Wireless Network Extender SCS-26UC4 and SCS-2U01 does not use CAVE authentication, which makes it easier for remote attackers to obtain ESN and MIN values from arbitrary phones, and conduct cloning attacks, by sniffing the network for registration packets. | |||||
CVE-2013-4875 | 1 Verizon | 1 Wireless Network Extender | 2024-11-21 | 6.2 MEDIUM | N/A |
The Uboot bootloader on the Verizon Wireless Network Extender SCS-2U01 allows physically proximate attackers to bypass the intended boot process and obtain a login prompt by connecting a crafted HDMI cable and sending a SysReq interrupt. | |||||
CVE-2013-4874 | 1 Verizon | 1 Wireless Network Extender | 2024-11-21 | 6.2 MEDIUM | N/A |
The Uboot bootloader on the Verizon Wireless Network Extender SCS-26UC4 allows physically proximate attackers to obtain root access by connecting a crafted HDMI cable and using a sys session to modify the ramboot environment variable. | |||||
CVE-2013-4863 | 1 Micasaverde | 2 Veralite, Veralite Firmware | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
The HomeAutomationGateway service in MiCasaVerde VeraLite with firmware 1.5.408 allows (1) remote attackers to execute arbitrary Lua code via a RunLua action in a request to upnp/control/hag on port 49451 or (2) remote authenticated users to execute arbitrary Lua code via a RunLua action in a request to port_49451/upnp/control/hag. | |||||
CVE-2013-4824 | 1 Hp | 2 Imc Service Operation Management Software Module, Intelligent Management Center | 2024-11-21 | 7.5 HIGH | N/A |
Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to bypass authentication via unknown vectors, aka ZDI-CAN-1644. | |||||
CVE-2013-4793 | 1 Umbraco | 1 Umbraco Cms | 2024-11-21 | 7.5 HIGH | N/A |
The update function in umbraco.webservices/templates/templateService.cs in the TemplateService component in Umbraco CMS before 6.0.4 does not require authentication, which allows remote attackers to execute arbitrary ASP.NET code via a crafted SOAP request. | |||||
CVE-2013-4784 | 1 Hp | 1 Integrated Lights-out Bmc | 2024-11-21 | 10.0 HIGH | N/A |
The HP Integrated Lights-Out (iLO) BMC implementation allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password. | |||||
CVE-2013-4783 | 1 Dell | 1 Idrac6 Bmc | 2024-11-21 | 10.0 HIGH | N/A |
The Dell iDRAC6 with firmware 1.x before 1.92 and 2.x and 3.x before 3.42, and iDRAC7 with firmware before 1.23.23, allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password. NOTE: the vendor disputes the significance of this issue, stating "DRAC's are intended to be on a separate management network; they are not designed nor intended to be placed on or connected to the Internet." | |||||
CVE-2013-4782 | 1 Supermicro | 1 Bmc | 2024-11-21 | 10.0 HIGH | N/A |
The Supermicro BMC implementation allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password. | |||||
CVE-2013-4772 | 1 Dlink | 4 Dir-505l Shareport Mobile Companion, Dir-505l Shareport Mobile Companion Firmware, Dir-826l Wireless N600 Cloud Router and 1 more | 2024-11-21 | 9.3 HIGH | N/A |
D-Link DIR-505L SharePort Mobile Companion 1.01 and DIR-826L Wireless N600 Cloud Router 1.02 allows remote attackers to bypass authentication via a direct request when an authorized session is active. | |||||
CVE-2013-4731 | 1 Choice-wireless | 1 Wixfmr-111 | 2024-11-21 | 9.3 HIGH | N/A |
ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote attackers to execute arbitrary commands via shell metacharacters in the pip parameter in an Ajax tag_ipPing request, a different vulnerability than CVE-2013-3581. | |||||
CVE-2013-4621 | 1 Magdevgroup | 1 Magnolia Cms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Magnolia CMS before 4.5.9 has multiple access bypass vulnerabilities | |||||
CVE-2013-4594 | 1 Payment For Webform Project | 1 Payment For Webform | 2024-11-21 | 4.3 MEDIUM | N/A |
The Payment for Webform module 7.x-1.x before 7.x-1.5 for Drupal does not restrict access by anonymous users, which allows remote anonymous users to use the payment of other anonymous users when submitting a form that requires payment. | |||||
CVE-2013-4593 | 1 Omniauth-facebook Project | 1 Omniauth-facebook | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
RubyGem omniauth-facebook has an access token security vulnerability | |||||
CVE-2013-4580 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 6.8 MEDIUM | N/A |
GitLab before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1, when using a MySQL backend, allows remote attackers to impersonate arbitrary users and bypass authentication via unspecified API calls. |