Vulnerabilities > Authentication Bypass by Spoofing

DATE CVE VULNERABILITY TITLE RISK
2024-06-05 CVE-2024-5037 Authentication Bypass by Spoofing vulnerability in Redhat products
A flaw was found in OpenShift's Telemeter.
network
low complexity
redhat CWE-290
7.5
2024-05-29 CVE-2024-4358 Authentication Bypass by Spoofing vulnerability in Telerik Report Server 2024 10.0.24.130/10.0.24.305
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
network
low complexity
telerik CWE-290
critical
9.8
2024-02-08 CVE-2023-7169 Authentication Bypass by Spoofing vulnerability in Snowsoftware Snow Inventory Agent
Authentication Bypass by Spoofing vulnerability in Snow Software Snow Inventory Agent on Windows allows Signature Spoof.This issue affects Snow Inventory Agent: through 6.14.5.
local
low complexity
snowsoftware CWE-290
5.5
2024-02-06 CVE-2024-22519 Authentication Bypass by Spoofing vulnerability in Sorenfriis Opendroneid OSM 3.5.1
An issue discovered in OpenDroneID OSM 3.5.1 allows attackers to impersonate other drones via transmission of crafted data packets.
network
low complexity
sorenfriis CWE-290
8.2
2024-02-06 CVE-2024-22520 Authentication Bypass by Spoofing vulnerability in Dronetag Drone Scanner 1.5.2
An issue discovered in Dronetag Drone Scanner 1.5.2 allows attackers to impersonate other drones via transmission of crafted data packets.
network
low complexity
dronetag CWE-290
8.2
2024-02-01 CVE-2024-23832 Authentication Bypass by Spoofing vulnerability in Joinmastodon Mastodon
Mastodon is a free, open-source social network server based on ActivityPub Mastodon allows configuration of LDAP for authentication.
network
low complexity
joinmastodon CWE-290
critical
9.8
2024-01-19 CVE-2023-6044 Authentication Bypass by Spoofing vulnerability in Lenovo Vantage
A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker with physical access to impersonate Lenovo Vantage Service and execute arbitrary code with elevated privileges.
low complexity
lenovo CWE-290
6.8
2024-01-15 CVE-2023-4001 Authentication Bypass by Spoofing vulnerability in multiple products
An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature.
low complexity
gnu redhat fedoraproject CWE-290
6.8
2024-01-12 CVE-2024-0454 Authentication Bypass by Spoofing vulnerability in EMC Elan Match-On-Chip FPR Solution Firmware 3.0.12011.08009/3.3.12011.08103
ELAN Match-on-Chip FPR solution has design fault about potential risk of valid SID leakage and enumeration with spoof sensor. This fault leads to that Windows Hello recognition would be bypass with cloning SID to cause broken account identity. Version which is lower than 3.0.12011.08009(Legacy)/3.3.12011.08103(ESS) would suffer this risk on DELL Inspiron platform.
low complexity
emc CWE-290
6.1
2024-01-11 CVE-2023-51350 Authentication Bypass by Spoofing vulnerability in Ujcms 8.0.2
A spoofing attack in ujcms v.8.0.2 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the X-Forwarded-For function in the header.
network
low complexity
ujcms CWE-290
critical
9.8