Vulnerabilities > Improper Authentication

DATE CVE VULNERABILITY TITLE RISK
2016-03-19 CVE-2016-2245 Improper Authentication vulnerability in HP Support Assistant 8.1.40.3
HP Support Assistant before 8.1.52.1 allows remote attackers to bypass authentication via unspecified vectors.
network
low complexity
hp CWE-287
critical
9.8
2016-03-03 CVE-2016-1329 Improper Authentication vulnerability in multiple products
Cisco NX-OS 6.0(2)U6(1) through 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) through 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote attackers to obtain root privileges via a (1) TELNET or (2) SSH session, aka Bug ID CSCuy25800.
network
low complexity
samsung sun zyxel zzinc CWE-287
critical
9.8
2016-02-04 CVE-2015-8269 Improper Authentication vulnerability in Fisher-Price Smart TOY Bear
The API on Fisher-Price Smart Toy Bear devices allows remote attackers to obtain sensitive information or modify data by leveraging presence in an 802.11 network's coverage area and entering an account number.
network
high complexity
fisher-price CWE-287
7.5
2016-01-29 CVE-2016-0755 Improper Authentication vulnerability in multiple products
The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.
network
low complexity
haxx canonical debian CWE-287
7.3
2016-01-29 CVE-2015-7521 Improper Authentication vulnerability in Apache Hive
The authorization framework in Apache Hive 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.0 and 1.2.1, on clusters protected by Ranger and SqlStdHiveAuthorization, allows attackers to bypass intended parent table access restrictions via unspecified partition-level operations.
network
low complexity
apache CWE-287
8.3
2016-01-26 CVE-2015-7974 Improper Authentication vulnerability in multiple products
NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
network
low complexity
ntp siemens netapp debian CWE-287
7.7
2016-01-15 CVE-2015-6314 Improper Authentication vulnerability in Cisco Wireless LAN Controller Software
Cisco Wireless LAN Controller (WLC) devices with software 7.6.x, 8.0 before 8.0.121.0, and 8.1 before 8.1.131.0 allow remote attackers to change configuration settings via unspecified vectors, aka Bug ID CSCuw06153.
network
low complexity
cisco CWE-287
critical
9.8
2016-01-09 CVE-2015-7938 Improper Authentication vulnerability in Advantech Eki-1321 Series Firmware and Eki-1322 Series Firmware
Advantech EKI-132x devices with firmware before 2015-12-31 allow remote attackers to bypass authentication via unspecified vectors.
network
low complexity
advantech CWE-287
critical
9.8
2015-12-21 CVE-2015-6480 Improper Authentication vulnerability in Moxa Oncell Central Manager 2.0
The MessageBrokerServlet servlet in Moxa OnCell Central Manager before 2.2 does not require authentication, which allows remote attackers to obtain administrative access via a command, as demonstrated by the addUserAndGroup action.
network
low complexity
moxa CWE-287
8.3
2015-12-21 CVE-2015-1772 Improper Authentication vulnerability in multiple products
The LDAP implementation in HiveServer2 in Apache Hive before 1.0.1 and 1.1.x before 1.1.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, mishandles simple unauthenticated and anonymous bind configurations, which allows remote attackers to bypass authentication via a crafted LDAP request.
network
low complexity
ibm apache CWE-287
7.3