Vulnerabilities > Improper Authentication

DATE CVE VULNERABILITY TITLE RISK
2014-05-13 CVE-2013-4552 Improper Authentication vulnerability in Drupalauth Project Drupalauth 1.2.1
lib/Auth/Source/External.php in the drupalauth module before 1.2.2 for simpleSAMLphp allows remote attackers to authenticate as an arbitrary user via the user name (uid) in a cookie.
network
low complexity
drupalauth-project CWE-287
7.5
2014-05-12 CVE-2013-4580 Improper Authentication vulnerability in Gitlab
GitLab before 5.4.2, Community Edition before 6.2.4, and Enterprise Edition before 6.2.1, when using a MySQL backend, allows remote attackers to impersonate arbitrary users and bypass authentication via unspecified API calls.
network
gitlab CWE-287
6.8
2014-05-08 CVE-2014-1682 Improper Authentication vulnerability in multiple products
The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.
network
low complexity
zabbix fedoraproject CWE-287
4.0
2014-05-02 CVE-2014-3139 Improper Authentication vulnerability in Unitrends Enterprise Backup 7.3.0
recoveryconsole/bpl/snmpd.php in Unitrends Enterprise Backup 7.3.0 allows remote attackers to bypass authentication by setting the auth parameter to a certain string.
network
low complexity
unitrends CWE-287
7.5
2014-04-29 CVE-2013-7302 Improper Authentication vulnerability in Ubercart
Session fixation vulnerability in the Ubercart module 6.x-2.x before 6.x-2.13 and 7.x-3.x before 7.x-3.6 for Drupal, when the "Log in new customers after checkout" option is enabled, allows remote attackers to hijack web sessions by leveraging knowledge of the original session ID.
6.8
2014-04-25 CVE-2014-0769 Improper Authentication vulnerability in multiple products
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 or (2) delete log entries via a request to the log service on port 4001.
9.3
2014-04-25 CVE-2014-0760 Improper Authentication vulnerability in multiple products
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion provide an undocumented access method involving the FTP protocol, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
9.3
2014-04-23 CVE-2014-1295 Improper Authentication vulnerability in Apple Iphone OS, mac OS X and Tvos
Secure Transport in Apple iOS before 7.1.1, Apple OS X 10.8.x and 10.9.x through 10.9.2, and Apple TV before 6.1.1 does not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which allows man-in-the-middle attackers to obtain sensitive information or modify TLS session data via a "triple handshake attack."
network
apple CWE-287
6.8
2014-04-23 CVE-2012-5032 Improper Authentication vulnerability in Cisco IOS
The Flex-VPN load-balancing feature in the ipsec-ikev2 implementation in Cisco IOS before 15.1(1)SY3 does not require authentication, which allows remote attackers to trigger the forwarding of VPN traffic to an attacker-controlled destination, or the discarding of this traffic, by arranging for an arbitrary device to become a cluster member, aka Bug ID CSCub93641.
network
low complexity
cisco CWE-287
6.4
2014-04-23 CVE-2012-4658 Improper Authentication vulnerability in Cisco IOS
The ios-authproxy implementation in Cisco IOS before 15.1(1)SY3 allows remote attackers to cause a denial of service (webauth and HTTP service outage) via vectors that trigger incorrectly terminated HTTP sessions, aka Bug ID CSCtz99447.
network
low complexity
cisco CWE-287
5.0