Vulnerabilities > Authentication Bypass by Spoofing
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-06-05 | CVE-2024-5037 | Authentication Bypass by Spoofing vulnerability in Redhat products A flaw was found in OpenShift's Telemeter. | 7.5 |
2024-05-29 | CVE-2024-4358 | Authentication Bypass by Spoofing vulnerability in Telerik Report Server 2024 10.0.24.130/10.0.24.305 In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability. | 9.8 |
2024-02-08 | CVE-2023-7169 | Authentication Bypass by Spoofing vulnerability in Snowsoftware Snow Inventory Agent Authentication Bypass by Spoofing vulnerability in Snow Software Snow Inventory Agent on Windows allows Signature Spoof.This issue affects Snow Inventory Agent: through 6.14.5. | 5.5 |
2024-02-06 | CVE-2024-22519 | Authentication Bypass by Spoofing vulnerability in Sorenfriis Opendroneid OSM 3.5.1 An issue discovered in OpenDroneID OSM 3.5.1 allows attackers to impersonate other drones via transmission of crafted data packets. | 8.2 |
2024-02-06 | CVE-2024-22520 | Authentication Bypass by Spoofing vulnerability in Dronetag Drone Scanner 1.5.2 An issue discovered in Dronetag Drone Scanner 1.5.2 allows attackers to impersonate other drones via transmission of crafted data packets. | 8.2 |
2024-02-01 | CVE-2024-23832 | Authentication Bypass by Spoofing vulnerability in Joinmastodon Mastodon Mastodon is a free, open-source social network server based on ActivityPub Mastodon allows configuration of LDAP for authentication. | 9.8 |
2024-01-19 | CVE-2023-6044 | Authentication Bypass by Spoofing vulnerability in Lenovo Vantage A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker with physical access to impersonate Lenovo Vantage Service and execute arbitrary code with elevated privileges. | 6.8 |
2024-01-15 | CVE-2023-4001 | Authentication Bypass by Spoofing vulnerability in multiple products An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. | 6.8 |
2024-01-12 | CVE-2024-0454 | Authentication Bypass by Spoofing vulnerability in EMC Elan Match-On-Chip FPR Solution Firmware 3.0.12011.08009/3.3.12011.08103 ELAN Match-on-Chip FPR solution has design fault about potential risk of valid SID leakage and enumeration with spoof sensor. This fault leads to that Windows Hello recognition would be bypass with cloning SID to cause broken account identity. Version which is lower than 3.0.12011.08009(Legacy)/3.3.12011.08103(ESS) would suffer this risk on DELL Inspiron platform. | 6.1 |
2024-01-11 | CVE-2023-51350 | Authentication Bypass by Spoofing vulnerability in Ujcms 8.0.2 A spoofing attack in ujcms v.8.0.2 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the X-Forwarded-For function in the header. | 9.8 |