Vulnerabilities (CVE)

Filtered by CWE-1390
Total 56 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-40554 2026-01-29 N/A 9.8 CRITICAL
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk.
CVE-2025-40552 2026-01-29 N/A 9.8 CRITICAL
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.
CVE-2023-53894 1 Dulldusk 1 Phpfilemanager 2026-01-21 N/A 9.8 CRITICAL
phpfm 1.7.9 contains an authentication bypass vulnerability that allows attackers to log in by exploiting loose type comparison in password hash validation. Attackers can craft specific password hashes beginning with 0e or 00e to bypass authentication and upload malicious PHP files to the server.
CVE-2025-63807 1 2dogz 1 Blogin 2026-01-15 N/A 9.8 CRITICAL
An issue was discovered in weijiang1994 university-bbs (aka Blogin) in commit 9e06bab430bfc729f27b4284ba7570db3b11ce84 (2025-01-13). A weak verification code generation mechanism combined with missing rate limiting allows attackers to perform brute-force attacks on verification codes without authentication. Successful exploitation may result in account takeover via password reset or other authentication bypass methods.
CVE-2025-49201 1 Fortinet 2 Fortipam, Fortiswitchmanager 2026-01-14 N/A 8.1 HIGH
A weak authentication vulnerability in Fortinet FortiPAM 1.5.0, FortiPAM 1.4.0 through 1.4.2, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions, FortiSwitchManager 7.2.0 through 7.2.4 allows attacker to execute unauthorized code or commands via specially crafted http requests
CVE-2025-1293 1 Hashicorp 1 Hermes 2025-12-18 N/A 8.2 HIGH
Hermes versions up to 0.4.0 improperly validated the JWT provided when using the AWS ALB authentication mode, potentially allowing for authentication bypass. This vulnerability, CVE-2025-1293, was fixed in Hermes 0.5.0.
CVE-2024-29837 1 Cs-technologies 1 Evolution 2025-12-10 N/A 8.8 HIGH
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below uses poor session management, allowing for an unauthenticated attacker to access administrator functionality if any other user is already signed in.
CVE-2024-52541 1 Dell 784 Alienware M15 R6, Alienware M15 R6 Firmware, Alienware M15 R7 and 781 more 2025-12-01 N/A 8.2 HIGH
Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
CVE-2025-12870 1 Aenrich 1 A\+hrd 2025-11-18 N/A 9.8 CRITICAL
The a+HRD developed by aEnrich has an Authentication Abuse vulnerability, allowing unauthenticated remote attackers to send crafted packets to obtain administrator access tokens and use them to access the system with elevated privileges.
CVE-2025-12871 1 Aenrich 1 A\+hrd 2025-11-18 N/A 9.8 CRITICAL
The a+HRD developed by aEnrich has an Authentication Abuse vulnerability, allowing unauthenticated remote attackers to craft administrator access tokens and use them to access the system with elevated privileges.
CVE-2025-1387 1 Learningdigital 1 Orca Hcm 2025-11-17 N/A 9.8 CRITICAL
Orca HCM from LEARNING DIGITAL has an Improper Authentication vulnerability, allowing unauthenticated remote attackers to log in to the system as any user.
CVE-2024-38182 1 Microsoft 1 Dynamics 365 2025-11-14 N/A 9.0 CRITICAL
Weak authentication in Microsoft Dynamics 365 allows an unauthenticated attacker to elevate privileges over a network.
CVE-2025-11084 2025-11-12 N/A N/A
A security issue exists within DataMosaix™ Private Cloud, allowing attackers to bypass MFA during setup and obtain a valid login-token cookie without knowing the users password. This vulnerability occurs when MFA is enabled but not completed within a 7-day period.
CVE-2024-29038 1 Tpm2-tools Project 1 Tpm2-tools 2025-11-04 N/A 4.3 MEDIUM
tpm2-tools is the source repository for the Trusted Platform Module (TPM2.0) tools. A malicious attacker can generate arbitrary quote data which is not detected by `tpm2 checkquote`. This issue was patched in version 5.7.
CVE-2025-30468 1 Apple 2 Ipados, Iphone Os 2025-11-03 N/A 6.5 MEDIUM
This issue was addressed through improved state management. This issue is fixed in iOS 26 and iPadOS 26. Private Browsing tabs may be accessed without authentication.
CVE-2025-59249 1 Microsoft 1 Exchange Server 2025-10-28 N/A 8.8 HIGH
Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network.
CVE-2025-26343 1 Q-free 1 Maxtime 2025-10-24 N/A 8.1 HIGH
A CWE-1390 "Weak Authentication" in the PIN authentication mechanism in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to brute-force user PINs via multiple crafted HTTP requests.
CVE-2024-45551 1 Qualcomm 484 Aqt1000, Aqt1000 Firmware, Ar8035 and 481 more 2025-10-06 N/A 6.2 MEDIUM
Cryptographic issue occurs during PIN/password verification using Gatekeeper, where RPMB writes can be dropped on verification failure, potentially leading to a user throttling bypass.
CVE-2024-6580 1 Nsoftware 1 Ipworks Ssh 2025-09-26 N/A 6.5 MEDIUM
The /n software IPWorks SSH library SFTPServer component can be induced to make unintended filesystem or network path requests when loading a SSH public key or certificate. To be exploitable, an application calling the SFTPServer component must grant user access without verifying the SSH public key or certificate (which would most likely be a separate vulnerability in the calling application). IPWorks SSH versions 22.0.8945 and 24.0.8945 were released to address this condition by blocking all filesystem and network path requests for SSH public keys or certificates.
CVE-2024-50563 1 Fortinet 4 Fortianalyzer, Fortianalyzer Cloud, Fortimanager and 1 more 2025-09-24 N/A 7.3 HIGH
A weak authentication in Fortinet FortiManager Cloud, FortiAnalyzer versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.