Vulnerabilities > Authentication Bypass by Spoofing
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-06-04 | CVE-2023-51543 | Authentication Bypass by Spoofing vulnerability in Metagauss Registrationmagic Authentication Bypass by Spoofing vulnerability in Metagauss RegistrationMagic allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects RegistrationMagic: from n/a through 5.2.5.0. | 7.5 |
2024-06-04 | CVE-2023-40332 | Authentication Bypass by Spoofing vulnerability in Lesterchan Wp-Postratings Improper Control of Interaction Frequency vulnerability in Lester ‘GaMerZ’ Chan WP-PostRatings allows Functionality Misuse.This issue affects WP-PostRatings: from n/a through 1.91. | 9.8 |
2024-05-29 | CVE-2024-4358 | Authentication Bypass by Spoofing vulnerability in Telerik Report Server 2024 10.0.24.130/10.0.24.305 In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability. | 9.8 |
2024-05-14 | CVE-2024-32977 | Authentication Bypass by Spoofing vulnerability in Octoprint OctoPrint provides a web interface for controlling consumer 3D printers. | 9.4 |
2024-05-03 | CVE-2022-22364 | Authentication Bypass by Spoofing vulnerability in IBM Cognos Controller 10.4.1/10.4.2/11.0.0 IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to external service interaction attack, caused by improper validation of user-supplied input. | 5.3 |
2024-04-02 | CVE-2024-22092 | Authentication Bypass by Spoofing vulnerability in Openatom Openharmony in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action. | 7.4 |
2024-03-07 | CVE-2024-28228 | Authentication Bypass by Spoofing vulnerability in Jetbrains Youtrack In JetBrains YouTrack before 2024.1.25893 creation comments on behalf of an arbitrary user in HelpDesk was possible | 5.3 |
2024-02-21 | CVE-2023-42843 | Authentication Bypass by Spoofing vulnerability in multiple products An inconsistent user interface issue was addressed with improved state management. | 4.3 |
2024-02-17 | CVE-2024-21494 | Authentication Bypass by Spoofing vulnerability in Greenpau Caddy-Security All versions of the package github.com/greenpau/caddy-security are vulnerable to Authentication Bypass by Spoofing via the X-Forwarded-For header due to improper input sanitization. | 5.4 |
2024-02-08 | CVE-2023-7169 | Authentication Bypass by Spoofing vulnerability in Snowsoftware Snow Inventory Agent Authentication Bypass by Spoofing vulnerability in Snow Software Snow Inventory Agent on Windows allows Signature Spoof.This issue affects Snow Inventory Agent: through 6.14.5. | 5.5 |