Vulnerabilities > Improper Authentication

DATE CVE VULNERABILITY TITLE RISK
2014-10-15 CVE-2014-2927 Improper Authentication vulnerability in F5 products
The rsync daemon in F5 BIG-IP 11.6 before 11.6.0, 11.5.1 before HF3, 11.5.0 before HF4, 11.4.1 before HF4, 11.4.0 before HF7, 11.3.0 before HF9, and 11.2.1 before HF11 and Enterprise Manager 3.x before 3.1.1 HF2, when configured in failover mode, does not require authentication, which allows remote attackers to read or write to arbitrary files via a cmi request to the ConfigSync IP address.
network
f5 CWE-287
critical
9.3
2014-10-14 CVE-2014-6379 Improper Authentication vulnerability in Juniper Junos
Juniper Junos 11.4 before R12, 12.1 before R10, 12.1X44 before D35, 12.1X45 before D25, 12.1X46 before D20, 12.1X47 before D10, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4-S3, 13.1X49 before D55, 13.1X50 before D30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D26 and D30, 13.2X52 before D15, 13.3 before R2, and 14.1 before R1, when a RADIUS accounting server is configured as [system accounting destination radius], creates an entry in /var/etc/pam_radius.conf, which might allow remote attackers to bypass authentication via unspecified vectors.
network
low complexity
juniper CWE-287
7.5
2014-10-10 CVE-2014-3402 Improper Authentication vulnerability in Cisco Intrusion Prevention System
The authentication-manager process in the web framework in Cisco Intrusion Prevention System (IPS) 7.0(8)E4 and earlier in Cisco Intrusion Detection System (IDS) does not properly manage user tokens, which allows remote attackers to cause a denial of service (temporary MainApp hang) via a crafted connection request to the management interface, aka Bug ID CSCuq39550.
network
low complexity
cisco CWE-287
5.0
2014-10-08 CVE-2014-6632 Improper Authentication vulnerability in Joomla Joomla!
Joomla! 2.5.x before 2.5.25, 3.x before 3.2.4, and 3.3.x before 3.3.4 allows remote attackers to authenticate and bypass intended access restrictions via vectors involving LDAP authentication.
network
low complexity
joomla CWE-287
7.5
2014-10-08 CVE-2014-5300 Improper Authentication vulnerability in Adaptivecomputing Moab 8.0
Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 allows remote attackers to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.
network
low complexity
adaptivecomputing CWE-287
5.0
2014-10-06 CVE-2014-0074 Improper Authentication vulnerability in Apache Shiro
Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password.
network
low complexity
apache CWE-287
7.5
2014-09-29 CVE-2013-3092 Improper Authentication vulnerability in Belkin N300 and N300 Firmware
The Belkin N300 (F7D7301v1) router allows remote attackers to bypass authentication and gain privileges via vectors related to incorrect validation of the HTTP Authorization header.
low complexity
belkin CWE-287
8.3
2014-09-23 CVE-2014-3106 Improper Authentication vulnerability in IBM Rational Clearcase
IBM Rational ClearQuest 7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 does not properly implement the Local Access Only protection mechanism, which allows remote attackers to bypass authentication and read files via the Help Server Administration feature.
network
low complexity
ibm CWE-287
5.0
2014-09-23 CVE-2014-3101 Improper Authentication vulnerability in IBM Rational Clearcase
The login form in the Web component in IBM Rational ClearQuest 7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 does not insert a delay after a failed authentication attempt, which makes it easier for remote attackers to obtain access via a brute-force attack.
network
low complexity
ibm CWE-287
5.0
2014-09-04 CVE-2014-2685 Improper Authentication vulnerability in Zend Framework and Zendopenid
The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 violate the OpenID 2.0 protocol by ensuring only that at least one field is signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
network
low complexity
zend CWE-287
7.5