Vulnerabilities > Improper Authentication

DATE CVE VULNERABILITY TITLE RISK
2017-09-27 CVE-2017-14766 Improper Authentication vulnerability in Saadamin Simple Student Result
The Simple Student Result plugin before 1.6.4 for WordPress has an Authentication Bypass vulnerability because the fn_ssr_add_st_submit() function and fn_ssr_del_st_submit() function in functions.php only require knowing the student id number.
network
low complexity
saadamin CWE-287
7.5
2017-09-26 CVE-2017-5192 Improper Authentication vulnerability in Saltstack Salt
When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.
network
low complexity
saltstack CWE-287
8.8
2017-09-26 CVE-2017-14602 Improper Authentication vulnerability in Citrix products
A vulnerability has been identified in the management interface of Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.1 before build 135.18, 10.5 before build 66.9, 10.5e before build 60.7010.e, 11.0 before build 70.16, 11.1 before build 55.13, and 12.0 before build 53.13 (except for build 41.24) that, if exploited, could allow an attacker with access to the NetScaler management interface to gain administrative access to the appliance.
network
low complexity
citrix CWE-287
7.2
2017-09-22 CVE-2017-14706 Improper Authentication vulnerability in Denyall I-Suite and web Application Firewall
DenyAll WAF before 6.4.1 allows unauthenticated remote attackers to obtain authentication information by making a typeOf=debug request to /webservices/download/index.php, and then reading the iToken field in the reply.
network
low complexity
denyall CWE-287
critical
9.8
2017-09-22 CVE-2017-14080 Improper Authentication vulnerability in Trendmicro Mobile Security 9.7
Authentication bypass vulnerability in Trend Micro Mobile Security (Enterprise) versions before 9.7 Patch 3 allows attackers to access a specific part of the console using a blank password.
network
low complexity
trendmicro CWE-287
critical
9.8
2017-09-21 CVE-2015-1187 Improper Authentication vulnerability in multiple products
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.
network
low complexity
dlink trendnet CWE-287
critical
9.8
2017-09-20 CVE-2017-14623 Improper Authentication vulnerability in Go-Ldap Project Ldap 2.5.0
In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be able to login with an empty password.
network
high complexity
go-ldap-project CWE-287
8.1
2017-09-19 CVE-2017-10784 Improper Authentication vulnerability in Ruby-Lang Ruby
The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.
network
low complexity
ruby-lang CWE-287
8.8
2017-09-19 CVE-2014-9618 Improper Authentication vulnerability in Netsweeper
The Client Filter Admin portal in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and subsequently create arbitrary profiles via a showdeny action to the default URL.
network
low complexity
netsweeper CWE-287
critical
9.8
2017-09-19 CVE-2014-9611 Improper Authentication vulnerability in Netsweeper
Netsweeper before 4.0.5 allows remote attackers to bypass authentication and create arbitrary accounts and policies via a request to webadmin/nslam/index.php.
network
low complexity
netsweeper CWE-287
critical
9.8