Total
3371 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2012-4926 | 1 Imgpals | 1 Img Pals Photo Host | 2024-11-21 | 6.4 MEDIUM | N/A |
approve.php in Img Pals Photo Host 1.0 does not authenticate requests, which allows remote attackers to change the activation of administrators via the u parameter in an (1) app0 (disable) or (2) app1 (enable) action. | |||||
CVE-2012-4741 | 1 Packetfence | 1 Packetfence | 2024-11-21 | 5.0 MEDIUM | N/A |
The RADIUS extension in PacketFence before 3.3.0 uses a different user name than is used for authentication for users with custom VLAN assignment extensions, which allows remote attackers to spoof user identities via the User-Name RADIUS attribute. | |||||
CVE-2012-4688 | 1 I-gen | 1 Oplynx | 2024-11-21 | 7.5 HIGH | N/A |
The Central application in i-GEN opLYNX before 2.01.9 allows remote attackers to bypass authentication via vectors involving the disabling of browser JavaScript support. | |||||
CVE-2012-4659 | 1 Cisco | 11 5500 Series Adaptive Security Appliance, Adaptive Security Appliance Software, Catalyst 6500 and 8 more | 2024-11-21 | 7.1 HIGH | N/A |
The AAA functionality in the IPv4 SSL VPN implementations on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.2 before 8.2(5.30) and 8.3 before 8.3(2.34) allows remote attackers to cause a denial of service (device reload) via a crafted authentication response, aka Bug ID CSCtz04566. | |||||
CVE-2012-4658 | 1 Cisco | 1 Ios | 2024-11-21 | 5.0 MEDIUM | N/A |
The ios-authproxy implementation in Cisco IOS before 15.1(1)SY3 allows remote attackers to cause a denial of service (webauth and HTTP service outage) via vectors that trigger incorrectly terminated HTTP sessions, aka Bug ID CSCtz99447. | |||||
CVE-2012-4614 | 1 Emc | 1 It Operations Intelligence | 2024-11-21 | 9.3 HIGH | N/A |
The default configuration of EMC Smarts Network Configuration Manager (NCM) before 9.1 does not require authentication for database access, which allows remote attackers to have an unspecified impact via a network session. | |||||
CVE-2012-4613 | 1 Emc | 1 Rsa Data Protection Manager Appliance | 2024-11-21 | 6.9 MEDIUM | N/A |
EMC RSA Data Protection Manager Appliance 2.7.x and 3.x before 3.2.1 does not properly restrict the number of authentication attempts by a user account, which makes it easier for local users to bypass intended access restrictions via a brute-force attack. | |||||
CVE-2012-4604 | 1 Websense | 1 Websense Web Security | 2024-11-21 | 4.3 MEDIUM | N/A |
The TRITON management console in Websense Web Security before 7.6 Hotfix 24 allows remote attackers to bypass authentication and read arbitrary reports via a crafted uid field, in conjunction with a crafted userRoles field, in a cookie, as demonstrated by a request to explorer_wse/favorites.exe. | |||||
CVE-2012-4599 | 1 Mcafee | 1 Smartfilter Administration | 2024-11-21 | 10.0 HIGH | N/A |
McAfee SmartFilter Administration, and SmartFilter Administration Bess Edition, before 4.2.1.01 does not require authentication for access to the JBoss Remote Method Invocation (RMI) interface, which allows remote attackers to execute arbitrary code via a crafted .war file. | |||||
CVE-2012-4595 | 1 Mcafee | 2 Email And Web Security, Email Gateway | 2024-11-21 | 7.5 HIGH | N/A |
McAfee Email and Web Security (EWS) 5.5 through Patch 6 and 5.6 through Patch 3, and McAfee Email Gateway (MEG) 7.0.0 and 7.0.1, allows remote attackers to bypass authentication and obtain an admin session ID via unspecified vectors. | |||||
CVE-2012-4581 | 1 Mcafee | 2 Email And Web Security, Email Gateway | 2024-11-21 | 6.8 MEDIUM | N/A |
McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not disable the server-side session token upon the closing of the Management Console/Dashboard, which makes it easier for remote attackers to hijack sessions by capturing a session cookie and then modifying the response to a login attempt, related to a "Logout Failure" issue. | |||||
CVE-2012-4545 | 1 Elinks | 1 Elinks | 2024-11-21 | 5.1 MEDIUM | N/A |
The http_negotiate_create_context function in protocol/http/http_negotiate.c in ELinks 0.12 before 0.12pre6, when using HTTP Negotiate or GSS-Negotiate authentication, delegates user credentials through GSSAPI, which allows remote servers to authenticate as the client via the delegated credentials. | |||||
CVE-2012-4457 | 1 Openstack | 1 Keystone | 2024-11-21 | 4.0 MEDIUM | N/A |
OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-3 does not properly handle authorization tokens for disabled tenants, which allows remote authenticated users to access the tenant's resources by requesting a token for the tenant. | |||||
CVE-2012-4456 | 1 Openstack | 1 Keystone | 2024-11-21 | 7.5 HIGH | N/A |
The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete arbitrary services. | |||||
CVE-2012-4446 | 1 Apache | 1 Qpid | 2024-11-21 | 6.8 MEDIUM | N/A |
The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request. | |||||
CVE-2012-4418 | 1 Apache | 1 Axis2 | 2024-11-21 | 5.8 MEDIUM | N/A |
Apache Axis2 allows remote attackers to forge messages and bypass authentication via an "XML Signature wrapping attack." | |||||
CVE-2012-4392 | 1 Owncloud | 1 Owncloud | 2024-11-21 | 7.5 HIGH | N/A |
index.php in ownCloud 4.0.7 does not properly validate the oc_token cookie, which allows remote attackers to bypass authentication via a crafted oc_token cookie value. | |||||
CVE-2012-4078 | 1 Cisco | 1 Unified Computing System | 2024-11-21 | 8.5 HIGH | N/A |
The Baseboard Management Controller (BMC) in Cisco Unified Computing System (UCS) does not properly handle SSH escape sequences, which allows remote authenticated users to bypass an unspecified authentication step via SSH port forwarding, aka Bug ID CSCtg17656. | |||||
CVE-2012-4066 | 1 Eucalyptus | 1 Eucalyptus | 2024-11-21 | 5.0 MEDIUM | N/A |
The internal message protocol for Walrus in Eucalyptus 3.2.0 and earlier does not require signatures for unspecified request headers, which allows attackers to (1) delete or (2) upload snapshots. | |||||
CVE-2012-4021 | 1 Mosp | 1 Kintai Kanri | 2024-11-21 | 5.5 MEDIUM | N/A |
MosP kintai kanri before 4.1.0 does not properly perform authentication, which allows remote authenticated users to impersonate arbitrary user accounts, and consequently obtain sensitive information or modify settings, via unspecified vectors. |