Vulnerabilities > Authentication Bypass by Spoofing

DATE CVE VULNERABILITY TITLE RISK
2024-09-10 CVE-2024-44104 Authentication Bypass by Spoofing vulnerability in Ivanti Workspace Control
An incorrectly implemented authentication scheme that is subjected to a spoofing attack in the management console of Ivanti Workspace Control version 10.18.0.0 and below allows a local authenticated attacker to escalate their privileges.
local
low complexity
ivanti CWE-290
7.8
2024-08-23 CVE-2024-42364 Authentication Bypass by Spoofing vulnerability in Gethomepage Homepage 0.9.1
Homepage is a highly customizable homepage with Docker and service API integrations.
network
low complexity
gethomepage CWE-290
6.5
2024-08-07 CVE-2024-41432 Authentication Bypass by Spoofing vulnerability in Likeshop 2.5.7.20210311
An IP Spoofing vulnerability has been discovered in Likeshop up to 2.5.7.20210811.
network
low complexity
likeshop CWE-290
5.3
2024-07-08 CVE-2024-6163 Authentication Bypass by Spoofing vulnerability in Checkmk
Certain http endpoints of Checkmk in Checkmk < 2.3.0p10 < 2.2.0p31, < 2.1.0p46, <= 2.0.0p39 allows remote attacker to bypass authentication and access data
network
low complexity
checkmk CWE-290
5.3
2024-06-11 CVE-2024-5812 Authentication Bypass by Spoofing vulnerability in Beyondtrust Beyondinsight Password Safe 24.1
A low severity vulnerability in BIPS has been identified where an attacker with high privileges or a compromised high privilege account can overwrite Read-Only smart rules via a specially crafted API request.
network
low complexity
beyondtrust CWE-290
2.7
2024-06-04 CVE-2023-51543 Authentication Bypass by Spoofing vulnerability in Metagauss Registrationmagic
Authentication Bypass by Spoofing vulnerability in Metagauss RegistrationMagic allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects RegistrationMagic: from n/a through 5.2.5.0.
network
low complexity
metagauss CWE-290
7.5
2024-06-04 CVE-2023-40332 Authentication Bypass by Spoofing vulnerability in Lesterchan Wp-Postratings
Improper Control of Interaction Frequency vulnerability in Lester ‘GaMerZ’ Chan WP-PostRatings allows Functionality Misuse.This issue affects WP-PostRatings: from n/a through 1.91.
network
low complexity
lesterchan CWE-290
critical
9.8
2024-05-29 CVE-2024-4358 Authentication Bypass by Spoofing vulnerability in Telerik Report Server 2024 10.0.24.130/10.0.24.305
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
network
low complexity
telerik CWE-290
critical
9.8
2024-05-14 CVE-2024-32977 Authentication Bypass by Spoofing vulnerability in Octoprint
OctoPrint provides a web interface for controlling consumer 3D printers.
network
low complexity
octoprint CWE-290
critical
9.4
2024-05-03 CVE-2022-22364 Authentication Bypass by Spoofing vulnerability in IBM Cognos Controller 10.4.1/10.4.2/11.0.0
IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to external service interaction attack, caused by improper validation of user-supplied input.
network
low complexity
ibm CWE-290
5.3