Vulnerabilities (CVE)

Filtered by CWE-290
Total 392 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-30142 2025-03-25 N/A 8.1 HIGH
An issue was discovered on G-Net Dashcam BB GONX devices. Bypassing of Device Pairing can occur. It uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device.
CVE-2025-30110 2025-03-21 N/A 6.5 MEDIUM
On IROAD X5 devices, a Bypass of Device Pairing can occur via MAC Address Spoofing. The dashcam's pairing mechanism relies solely on MAC address verification, allowing an attacker to bypass authentication by spoofing an already-paired MAC address that can be captured via an ARP scan.
CVE-2024-8908 1 Google 1 Chrome 2025-03-20 N/A 4.3 MEDIUM
Inappropriate implementation in Autofill in Google Chrome prior to 129.0.6668.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
CVE-2024-7981 1 Google 1 Chrome 2025-03-20 N/A 4.3 MEDIUM
Inappropriate implementation in Views in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
CVE-2023-28452 1 Coredns.io 1 Coredns 2025-03-19 N/A 7.5 HIGH
An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID.
CVE-2024-41107 1 Apache 1 Cloudstack 2025-03-19 N/A 8.1 HIGH
The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account. Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.
CVE-2025-30144 2025-03-19 N/A 6.5 MEDIUM
fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 5.0.6, the fast-jwt library does not properly validate the iss claim based on the RFC 7519. The iss (issuer) claim validation within the fast-jwt library permits an array of strings as a valid iss value. This design flaw enables a potential attack where a malicious actor crafts a JWT with an iss claim structured as ['https://attacker-domain/', 'https://valid-iss']. Due to the permissive validation, the JWT will be deemed valid. Furthermore, if the application relies on external libraries like get-jwks that do not independently validate the iss claim, the attacker can leverage this vulnerability to forge a JWT that will be accepted by the victim application. Essentially, the attacker can insert their own domain into the iss array, alongside the legitimate issuer, and bypass the intended security checks. This issue is fixed in 5.0.6.
CVE-2024-8399 1 Mozilla 1 Firefox Focus 2025-03-19 N/A 4.7 MEDIUM
Websites could utilize Javascript links to spoof URL addresses in the Focus navigation bar This vulnerability affects Focus for iOS < 130.
CVE-2024-27853 1 Apple 1 Macos 2025-03-19 N/A 4.4 MEDIUM
This issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4. A maliciously crafted ZIP archive may bypass Gatekeeper checks.
CVE-2022-4550 1 User Activity Project 1 User Activity 2025-03-18 N/A 7.5 HIGH
The User Activity WordPress plugin through 1.0.1 checks headers such as the X-Forwarded-For to retrieve the IP address of the request, which could lead to IP spoofing
CVE-2022-3180 2025-03-14 N/A 9.8 CRITICAL
The WPGateway Plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 3.5. This allows unauthenticated attackers to create arbitrary malicious administrator accounts.
CVE-2022-23131 1 Zabbix 1 Zabbix 2025-03-12 5.1 MEDIUM 9.1 CRITICAL
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
CVE-2025-27616 2025-03-10 N/A 8.5 HIGH
Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. Prior to versions 0.25.3 and 0.26.3, by spoofing a webhook payload with a specific set of headers and body data, an attacker could transfer ownership of a repository and its repo level secrets to a separate repository. These secrets could be exfiltrated by follow up builds to the repository. Users with an enabled repository with access to repo level CI secrets in Vela are vulnerable to the exploit, and any user with access to the CI instance and the linked source control manager can perform the exploit. Versions 0.25.3 and 0.26.3 fix the issue. No known workarounds are available.
CVE-2022-24112 1 Apache 1 Apisix 2025-03-06 7.5 HIGH 9.8 CRITICAL
An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.
CVE-2025-22271 2025-03-05 N/A N/A
The application or its infrastructure allows for IP address spoofing by providing its own value in the "X-Forwarded-For" header. Thus, the action logging mechanism in the application loses accountability This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.
CVE-2023-23398 1 Microsoft 3 365 Apps, Excel, Office 2025-02-28 N/A 7.1 HIGH
Microsoft Excel Spoofing Vulnerability
CVE-2021-31172 1 Microsoft 2 Sharepoint Foundation, Sharepoint Server 2025-02-28 5.8 MEDIUM 7.1 HIGH
Microsoft SharePoint Server Spoofing Vulnerability
CVE-2021-28478 1 Microsoft 2 Sharepoint Foundation, Sharepoint Server 2025-02-28 5.8 MEDIUM 7.6 HIGH
Microsoft SharePoint Server Spoofing Vulnerability
CVE-2021-26418 1 Microsoft 2 Sharepoint Foundation, Sharepoint Server 2025-02-28 5.8 MEDIUM 4.6 MEDIUM
Microsoft SharePoint Server Spoofing Vulnerability
CVE-2023-38173 1 Microsoft 1 Edge Chromium 2025-02-28 N/A 4.3 MEDIUM
Microsoft Edge for Android Spoofing Vulnerability