Vulnerabilities > Authentication Bypass by Spoofing

DATE CVE VULNERABILITY TITLE RISK
2021-08-17 CVE-2021-28372 Authentication Bypass by Spoofing vulnerability in Throughtek Kalay P2P Software Development KIT 3.1.5
ThroughTek's Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID).
network
high complexity
throughtek CWE-290
8.3
2021-07-26 CVE-2021-32631 Authentication Bypass by Spoofing vulnerability in Nimble-Project Common
Common is a package of common modules that can be accessed by NIMBLE services.
network
low complexity
nimble-project CWE-290
6.5
2021-07-22 CVE-2020-7388 Authentication Bypass by Spoofing vulnerability in Sage Adxadmin
Sage X3 Unauthenticated Remote Command Execution (RCE) as SYSTEM in AdxDSrv.exe component.
network
low complexity
sage CWE-290
critical
9.8
2021-07-16 CVE-2021-34466 Authentication Bypass by Spoofing vulnerability in Microsoft Windows 10
Windows Hello Security Feature Bypass Vulnerability
high complexity
microsoft CWE-290
5.7
2021-07-14 CVE-2021-22779 Authentication Bypass by Spoofing vulnerability in Schneider-Electric products
Authentication Bypass by Spoofing vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Control Expert V15.0 SP1, EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), SCADAPack RemoteConnect for x70 (all versions), Modicon M580 CPU (all versions - part numbers BMEP* and BMEH*), Modicon M340 CPU (all versions - part numbers BMXP34*), that could cause unauthorized access in read and write mode to the controller by spoofing the Modbus communication between the engineering software and the controller.
network
low complexity
schneider-electric CWE-290
critical
9.1
2021-06-29 CVE-2021-34548 Authentication Bypass by Spoofing vulnerability in Torproject TOR
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003.
network
low complexity
torproject CWE-290
7.5
2021-06-08 CVE-2021-28810 Authentication Bypass by Spoofing vulnerability in Qnap Roon Server
If exploited, this vulnerability allows an attacker to access resources which are not otherwise accessible without proper authentication.
network
low complexity
qnap CWE-290
7.5
2021-05-10 CVE-2020-13529 Authentication Bypass by Spoofing vulnerability in multiple products
An exploitable denial-of-service vulnerability exists in Systemd 245.
6.1
2021-05-07 CVE-2020-36128 Authentication Bypass by Spoofing vulnerability in Paxtechnology Paxstore 7.0.820200511171508
Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by a token spoofing vulnerability.
network
low complexity
paxtechnology CWE-290
8.2
2021-04-27 CVE-2021-29441 Authentication Bypass by Spoofing vulnerability in Alibaba Nacos
Nacos is a platform designed for dynamic service discovery and configuration and service management.
network
low complexity
alibaba CWE-290
critical
9.8