Vulnerabilities > Authentication Bypass by Spoofing

DATE CVE VULNERABILITY TITLE RISK
2022-10-11 CVE-2022-35770 Authentication Bypass by Spoofing vulnerability in Microsoft products
Windows NTLM Spoofing Vulnerability
network
low complexity
microsoft CWE-290
6.5
2022-09-27 CVE-2021-27854 Authentication Bypass by Spoofing vulnerability in multiple products
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.
low complexity
ieee ietf CWE-290
4.7
2022-09-27 CVE-2021-27861 Authentication Bypass by Spoofing vulnerability in multiple products
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length (and optionally VLAN0 headers)
low complexity
ieee ietf CWE-290
4.7
2022-09-27 CVE-2021-27862 Authentication Bypass by Spoofing vulnerability in multiple products
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).
low complexity
ieee ietf CWE-290
4.7
2022-09-27 CVE-2021-27853 Authentication Bypass by Spoofing vulnerability in multiple products
Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.
low complexity
ieee ietf cisco CWE-290
4.7
2022-09-23 CVE-2022-39227 Authentication Bypass by Spoofing vulnerability in Python-Jwt Project Python-Jwt
python-jwt is a module for generating and verifying JSON Web Tokens.
network
low complexity
python-jwt-project CWE-290
critical
9.1
2022-09-21 CVE-2021-43310 Authentication Bypass by Spoofing vulnerability in Keylime
A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier.
network
low complexity
keylime CWE-290
critical
9.8
2022-09-21 CVE-2022-23949 Authentication Bypass by Spoofing vulnerability in Keylime
In Keylime before 6.3.0, unsanitized UUIDs can be passed by a rogue agent and can lead to log spoofing on the verifier and registrar.
network
low complexity
keylime CWE-290
7.5
2022-09-20 CVE-2022-35957 Authentication Bypass by Spoofing vulnerability in multiple products
Grafana is an open-source platform for monitoring and observability.
network
high complexity
grafana fedoraproject CWE-290
6.6
2022-08-25 CVE-2022-32744 Authentication Bypass by Spoofing vulnerability in Samba
A flaw was found in Samba.
network
low complexity
samba CWE-290
8.8