Vulnerabilities (CVE)

Filtered by CWE-290
Total 392 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-36883 1 Microsoft 1 Edge 2025-02-28 N/A 4.3 MEDIUM
Microsoft Edge for iOS Spoofing Vulnerability
CVE-2023-36769 1 Microsoft 1 Onenote 2025-02-28 N/A 4.6 MEDIUM
Microsoft OneNote Spoofing Vulnerability
CVE-2023-35392 1 Microsoft 1 Edge Chromium 2025-02-28 N/A 4.7 MEDIUM
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2023-29334 1 Microsoft 1 Edge Chromium 2025-02-28 N/A 4.3 MEDIUM
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2023-24935 1 Microsoft 1 Edge Chromium 2025-02-28 N/A 6.1 MEDIUM
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2023-24892 1 Microsoft 1 Edge Chromium 2025-02-28 N/A 8.2 HIGH
Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
CVE-2023-21794 1 Microsoft 1 Edge Chromium 2025-02-28 N/A 4.3 MEDIUM
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2021-31209 1 Microsoft 1 Exchange Server 2025-02-28 5.8 MEDIUM 6.5 MEDIUM
Microsoft Exchange Server Spoofing Vulnerability
CVE-2021-31195 1 Microsoft 1 Exchange Server 2025-02-28 6.8 MEDIUM 6.5 MEDIUM
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2022-48349 1 Huawei 2 Emui, Harmonyos 2025-02-24 N/A 9.1 CRITICAL
The control component has a spoofing vulnerability. Successful exploitation of this vulnerability may affect confidentiality and availability.
CVE-2020-6158 2025-02-21 N/A 4.7 MEDIUM
Opera Mini for Android before version 52.2 is vulnerable to an address bar spoofing attack. The vulnerability allows a malicious page to trick the browser into showing an address of a different page. This may allow the malicious page to impersonate another page and trick a user into providing sensitive data.
CVE-2023-0816 1 Strategy11 1 Formidable Form Builder 2025-02-19 N/A 6.5 MEDIUM
The Formidable Forms WordPress plugin before 6.1 uses several potentially untrusted headers to determine the IP address of the client, leading to IP Address spoofing and bypass of anti-spam protections.
CVE-2025-25055 2025-02-18 N/A 5.3 MEDIUM
Authentication bypass by spoofing issue exists in FileMegane versions above 1.0.0.0 prior to 3.4.0.0, which may lead to user impersonation. If exploited, restricted file contents may be accessed.
CVE-2024-27349 2025-02-13 N/A 9.1 CRITICAL
Authentication Bypass by Spoofing vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0. Users are recommended to upgrade to version 1.3.0, which fixes the issue.
CVE-2023-51747 2025-02-13 N/A 7.1 HIGH
Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions.
CVE-2023-3128 1 Grafana 1 Grafana 2025-02-13 N/A 9.4 CRITICAL
Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
CVE-2023-34329 1 Ami 1 Megarac Sp-x 2025-02-13 N/A 9.1 CRITICAL
AMI MegaRAC SPx12 contains a vulnerability in BMC where a User may cause an authentication bypass by spoofing the HTTP header. A successful exploit of this vulnerability may lead to loss of confidentiality, integrity, and availability.
CVE-2023-31424 1 Broadcom 1 Brocade Sannav 2025-02-13 N/A 8.1 HIGH
Brocade SANnav Web interface before Brocade SANnav v2.3.0 and v2.2.2a allows remote unauthenticated users to bypass web authentication and authorization.
CVE-2025-25182 2025-02-12 N/A 9.4 CRITICAL
Stroom is a data processing, storage and analysis platform. A vulnerability exists starting in version 7.2-beta.53 and prior to versions 7.2.24, 7.3-beta.22, 7.4.4, and 7.5-beta.2 that allows authentication bypass to a Stroom system when configured with ALB and installed in a way that the application is accessible not through the ALB itself. This vulnerability may also allow for server-side request forgery which may lead to code execution or further privileges escalations when using the AWS metadata URL. This scenario assumes that Stroom must be configured to use ALB Authentication integration and the application is network accessible. The vulnerability has been fixed in versions 7.2.24, 7.3-beta.22, 7.4.4, and 7.5-beta.2.
CVE-2024-5812 1 Beyondtrust 1 Beyondinsight Password Safe 2025-02-11 N/A 3.3 LOW
A low severity vulnerability in BIPS has been identified where an attacker with high privileges or a compromised high privilege account can overwrite Read-Only smart rules via a specially crafted API request.