Vulnerabilities > Authentication Bypass by Spoofing

DATE CVE VULNERABILITY TITLE RISK
2024-06-04 CVE-2023-51543 Authentication Bypass by Spoofing vulnerability in Metagauss Registrationmagic
Authentication Bypass by Spoofing vulnerability in Metagauss RegistrationMagic allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects RegistrationMagic: from n/a through 5.2.5.0.
network
low complexity
metagauss CWE-290
7.5
2024-06-04 CVE-2023-40332 Authentication Bypass by Spoofing vulnerability in Lesterchan Wp-Postratings
Improper Control of Interaction Frequency vulnerability in Lester ‘GaMerZ’ Chan WP-PostRatings allows Functionality Misuse.This issue affects WP-PostRatings: from n/a through 1.91.
network
low complexity
lesterchan CWE-290
critical
9.8
2024-05-29 CVE-2024-4358 Authentication Bypass by Spoofing vulnerability in Telerik Report Server 2024 10.0.24.130/10.0.24.305
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
network
low complexity
telerik CWE-290
critical
9.8
2024-05-14 CVE-2024-32977 Authentication Bypass by Spoofing vulnerability in Octoprint
OctoPrint provides a web interface for controlling consumer 3D printers.
network
low complexity
octoprint CWE-290
critical
9.4
2024-05-03 CVE-2022-22364 Authentication Bypass by Spoofing vulnerability in IBM Cognos Controller 10.4.1/10.4.2/11.0.0
IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to external service interaction attack, caused by improper validation of user-supplied input.
network
low complexity
ibm CWE-290
5.3
2024-04-02 CVE-2024-22092 Authentication Bypass by Spoofing vulnerability in Openatom Openharmony
in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action.
network
low complexity
openatom CWE-290
7.4
2024-03-07 CVE-2024-28228 Authentication Bypass by Spoofing vulnerability in Jetbrains Youtrack
In JetBrains YouTrack before 2024.1.25893 creation comments on behalf of an arbitrary user in HelpDesk was possible
network
low complexity
jetbrains CWE-290
5.3
2024-02-21 CVE-2023-42843 Authentication Bypass by Spoofing vulnerability in multiple products
An inconsistent user interface issue was addressed with improved state management.
network
low complexity
apple fedoraproject wpewebkit webkitgtk CWE-290
4.3
2024-02-17 CVE-2024-21494 Authentication Bypass by Spoofing vulnerability in Greenpau Caddy-Security
All versions of the package github.com/greenpau/caddy-security are vulnerable to Authentication Bypass by Spoofing via the X-Forwarded-For header due to improper input sanitization.
network
low complexity
greenpau CWE-290
5.4
2024-02-08 CVE-2023-7169 Authentication Bypass by Spoofing vulnerability in Snowsoftware Snow Inventory Agent
Authentication Bypass by Spoofing vulnerability in Snow Software Snow Inventory Agent on Windows allows Signature Spoof.This issue affects Snow Inventory Agent: through 6.14.5.
local
low complexity
snowsoftware CWE-290
5.5