Vulnerabilities (CVE)

Filtered by CWE-287
Total 3719 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-55171 1 Wegia 1 Wegia 2025-08-14 N/A 7.5 HIGH
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, the application does not check authentication at endpoint /html/personalizacao_remover.php allowing anonymous attacker (without login) to delete any Image files at endpoint /html/personalizacao_remover.php by defining imagem_0 as image id to delete. This issue has been patched in version 3.4.8.
CVE-2025-55169 1 Wegia 1 Wegia 2025-08-14 N/A 6.5 MEDIUM
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, a path traversal vulnerability was discovered in the WeGIA application, html/socio/sistema/download_remessa.php endpoint. This vulnerability could allow an attacker to gain unauthorized access to local files in the server and sensitive information stored in config.php. config.php contains information that could allow direct access to the database. This issue has been patched in version 3.4.8.
CVE-2025-53793 2025-08-13 N/A 7.5 HIGH
Improper authentication in Azure Stack allows an unauthorized attacker to disclose information over a network.
CVE-2025-53778 2025-08-13 N/A 8.8 HIGH
Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.
CVE-2025-53169 1 Huawei 1 Harmonyos 2025-08-12 N/A 7.6 HIGH
Vulnerability of bypassing the process to start SA and use related functions on distributed cameras Impact: Successful exploitation of this vulnerability may allow the peer device to use the camera without user awareness.
CVE-2025-5495 1 Netgear 2 Wnr614, Wnr614 Firmware 2025-08-11 7.5 HIGH 7.3 HIGH
A vulnerability was found in Netgear WNR614 1.1.0.28_1.0.1WW. It has been classified as critical. This affects an unknown part of the component URL Handler. The manipulation with the input %00currentsetting.htm leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This issue appears to have been circulating as an 0day since 2024.
CVE-2025-54888 2025-08-11 N/A N/A
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. In versions below 1.3.20, 1.4.0-dev.585 through 1.4.12, 1.5.0-dev.636 through 1.5.4, 1.6.0-dev.754 through 1.6.7, 1.7.0-pr.251.885 through 1.7.8 and 1.8.0-dev.909 through 1.8.4, an authentication bypass vulnerability allows any unauthenticated attacker to impersonate any ActivityPub actor by sending forged activities signed with their own keys. Activities are processed before verifying the signing key belongs to the claimed actor, enabling complete actor impersonation across all Fedify instances. This is fixed in versions 1.3.20, 1.4.13, 1.5.5, 1.6.8, 1.7.9 and 1.8.5.
CVE-2025-8838 2025-08-11 7.5 HIGH 7.3 HIGH
A vulnerability has been found in WinterChenS my-site up to 1f7525f15934d9d6a278de967f6ec9f1757738d8. This vulnerability affects the function preHandle of the file /admin/ of the component Backend Interface. The manipulation of the argument uri leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The code maintainer responded to the issue that "[he] tried it, and using this link automatically redirects to the login page."
CVE-2025-49591 1 Xwiki 1 Cryptpad 2025-08-11 N/A 9.1 CRITICAL
CryptPad is a collaboration suite. Prior to version 2025.3.0, enforcement of Two-Factor Authentication (2FA) in CryptPad can be trivially bypassed, due to weak implementation of access controls. An attacker that compromises a user's credentials can gain access to the victim's account, even if the victim has 2FA set up. This is due to 2FA not being enforced if the path parameter is not 44 characters long, which can be bypassed by simply URL encoding a single character in the path. This issue has been patched in version 2025.3.0.
CVE-2023-33054 1 Qualcomm 336 315 5g Iot Modem, 315 5g Iot Modem Firmware, 8098 and 333 more 2025-08-11 N/A 9.1 CRITICAL
Cryptographic issue in GPS HLOS Driver while downloading Qualcomm GNSS assistance data.
CVE-2025-21450 1 Qualcomm 216 Ar8035, Ar8035 Firmware, Fastconnect 6200 and 213 more 2025-08-11 N/A 9.1 CRITICAL
Cryptographic issue occurs due to use of insecure connection method while downloading.
CVE-2023-24852 1 Qualcomm 542 315 5g Iot Modem, 315 5g Iot Modem Firmware, 9205 Lte Modem and 539 more 2025-08-11 N/A 8.4 HIGH
Memory Corruption in Core due to secure memory access by user while loading modem image.
CVE-2023-33070 1 Qualcomm 204 Apq5053-aa, Apq5053-aa Firmware, Aqt1000 and 201 more 2025-08-11 N/A 7.1 HIGH
Transient DOS in Automotive OS due to improper authentication to the secure IO calls.
CVE-2024-38426 1 Qualcomm 328 205, 205 Firmware, 215 and 325 more 2025-08-11 N/A 5.4 MEDIUM
While processing the authentication message in UE, improper authentication may lead to information disclosure.
CVE-2023-43551 1 Qualcomm 482 205 Mobile, 205 Mobile Firmware, 215 Mobile and 479 more 2025-08-11 N/A 9.1 CRITICAL
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
CVE-2024-6248 1 Wyze 2 Cam V3, Cam V3 Firmware 2025-08-08 N/A 7.5 HIGH
Wyze Cam v3 Cloud Infrastructure Improper Authentication Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Wyze Cam v3 IP cameras. Authentication is not required to exploit this vulnerability. The specific flaw exists within the run_action_batch endpoint of the cloud infrastructure. The issue results from the use of the device's MAC address as a sole credential for authentication. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-22393.
CVE-2025-54786 2025-08-07 N/A 5.3 MEDIUM
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. In versions 7.14.6 and 8.8.0, the broken authentication in the legacy iCal service allows unauthenticated access to meeting data. An unauthenticated actor can view any user's meeting (calendar event) data given their username, related functionality allows user enumeration. This is fixed in versions 7.14.7 and 8.8.1.
CVE-2024-1039 1 Gesslergmbh 2 Web-master, Web-master Firmware 2025-08-07 N/A 9.8 CRITICAL
Gessler GmbH WEB-MASTER has a restoration account that uses weak hard coded credentials and if exploited could allow an attacker control over the web management of the device.
CVE-2025-53786 2025-08-06 N/A 8.0 HIGH
On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April announcement. Microsoft is issuing CVE-2025-53786 to document a vulnerability that is addressed by taking the steps documented with the April 18th announcement. Microsoft strongly recommends reading the information, installing the April 2025 (or later) Hot Fix and implementing the changes in your Exchange Server and hybrid environment.
CVE-2025-8546 2025-08-05 5.0 MEDIUM 5.3 MEDIUM
A vulnerability, which was classified as problematic, was found in atjiu pybbs up to 6.0.0. This affects the function adminlogin/login of the component Verification Code Handler. The manipulation leads to guessable captcha. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The patch is named ecaf8d46944fd03e3c4ea05698f8acf0aaa570cf. It is recommended to apply a patch to fix this issue.