Vulnerabilities (CVE)

Filtered by CWE-287
Total 3605 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-3297 1 Zyxel 2 Nbg2105, Nbg2105 Firmware 2024-11-21 7.2 HIGH 7.8 HIGH
On Zyxel NBG2105 V1.00(AAGU.2)C0 devices, setting the login cookie to 1 provides administrator access.
CVE-2021-3282 1 Hashicorp 1 Vault 2024-11-21 5.0 MEDIUM 7.5 HIGH
HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` raft operator command to be executed against DR secondaries without authentication. Fixed in 1.6.2.
CVE-2021-3153 1 Hashicorp 1 Terraform Enterprise 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
HashiCorp Terraform Enterprise up to v202102-2 failed to enforce an organization-level setting that required users within an organization to have two-factor authentication enabled. Fixed in v202103-1.
CVE-2021-3145 1 Ionic 1 Identity Vault 2024-11-21 7.2 HIGH 6.7 MEDIUM
In Ionic Identity Vault before 5, a local root attacker on an Android device can bypass biometric authentication.
CVE-2021-3046 1 Paloaltonetworks 1 Pan-os 2024-11-21 4.3 MEDIUM 6.8 MEDIUM
An improper authentication vulnerability exists in Palo Alto Networks PAN-OS software that enables a SAML authenticated attacker to impersonate any other user in the GlobalProtect Portal and GlobalProtect Gateway when they are configured to use SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.5. PAN-OS 10.1 versions are not impacted.
CVE-2021-39890 1 Gitlab 1 Gitlab 2024-11-21 7.5 HIGH 3.1 LOW
It was possible to bypass 2FA for LDAP users and access some specific pages with Basic Authentication in GitLab 14.1.1 and above.
CVE-2021-39872 1 Gitlab 1 Gitlab 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
In all versions of GitLab CE/EE since version 14.1, an improper access control vulnerability allows users with expired password to still access GitLab through git and API through access tokens acquired before password expiration.
CVE-2021-39296 1 Openbmc-project 1 Openbmc 2024-11-21 10.0 HIGH 10.0 CRITICAL
In OpenBMC 2.9, crafted IPMI messages allow an attacker to bypass authentication and gain full control of the system.
CVE-2021-39215 1 8x8 1 Jitsi Meet 2024-11-21 5.0 MEDIUM 7.5 HIGH
Jitsi Meet is an open source video conferencing application. In versions prior to 2.0.5963, a Prosody module allows the use of symmetrical algorithms to validate JSON web tokens. This means that tokens generated by arbitrary sources can be used to gain authorization to protected rooms. This issue is fixed in Jitsi Meet 2.0.5963. There are no known workarounds aside from updating.
CVE-2021-39177 1 Geysermc 1 Geyser 2024-11-21 7.5 HIGH 7.4 HIGH
Geyser is a bridge between Minecraft: Bedrock Edition and Minecraft: Java Edition. Versions of Geyser prior to 1.4.2-SNAPSHOT allow anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any user. Version 1.4.2-SNAPSHOT contains a patch for the issue. There are no known workarounds aside from upgrading.
CVE-2021-39165 1 Chachethq 1 Cachet 2024-11-21 5.0 MEDIUM 8.1 HIGH
Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet <https://github.com/CachetHQ/Cachet> is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected.
CVE-2021-39064 2 Ibm, Linux 2 Spectrum Copy Data Management, Linux Kernel 2024-11-21 5.0 MEDIUM 7.5 HIGH
IBM Spectrum Copy Data Management 2.2.13 and earlier has weak authentication and password rules and incorrectly handles default credentials for the Spectrum Copy Data Management Admin console. IBM X-Force ID: 214957.
CVE-2021-38688 1 Qnap 1 Qfile 2024-11-21 5.0 MEDIUM 7.1 HIGH
An improper authentication vulnerability has been reported to affect Android App Qfile. If exploited, this vulnerability allows attackers to compromise app and access information We have already fixed this vulnerability in the following versions of Qfile: Qfile 3.0.0.1105 and later
CVE-2021-38686 1 Qnap 1 Qvr 2024-11-21 6.8 MEDIUM 8.8 HIGH
An improper authentication vulnerability has been reported to affect QNAP device, VioStor. If exploited, this vulnerability allows attackers to compromise the security of the system. We have already fixed this vulnerability in the following versions of QVR: QVR FW 5.1.6 build 20211109 and later
CVE-2021-38679 1 Qnap 1 Kazoo Server 2024-11-21 7.5 HIGH 6.5 MEDIUM
An improper authentication vulnerability has been reported to affect QNAP NAS running Kazoo Server. If exploited, this vulnerability allows attackers to compromise the security of the system. We have already fixed this vulnerability in the following versions of Kazoo Server: Kazoo Server 4.11.22 and later
CVE-2021-38376 1 Open-xchange 1 Ox App Suite 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
OX App Suite through 7.10.5 has Incorrect Access Control for retrieval of session information via the rampup action of the login API call.
CVE-2021-38299 1 Spomky-labs 1 Webauthn Framwork 2024-11-21 7.5 HIGH 9.8 CRITICAL
Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence.
CVE-2021-38161 2 Apache, Debian 2 Traffic Server, Debian Linux 2024-11-21 6.8 MEDIUM 8.1 HIGH
Improper Authentication vulnerability in TLS origin verification of Apache Traffic Server allows for man in the middle attacks. This issue affects Apache Traffic Server 8.0.0 to 8.0.8.
CVE-2021-37597 1 Wpcerber 1 Wp Cerber 2024-11-21 7.5 HIGH 9.8 CRITICAL
WP Cerber before 8.9.3 allows MFA bypass via wordpress_logged_in_[hash] manipulation.
CVE-2021-37580 1 Apache 1 Shenyu 2024-11-21 7.5 HIGH 9.8 CRITICAL
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0