Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bypass vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2018-8466
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2...
Microsoft Chakracore
Microsoft Edge -
1 EDB exploit
6.8
CVSSv3
CVE-2022-20662
A vulnerability in the smart card login authentication of Cisco Duo for macOS could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability exists because the assigned user of a smart card is not properly matched with the authenticating...
Cisco Duo
5.5
CVSSv3
CVE-2018-4863
Sophos Endpoint Protection 10.7 allows local users to bypass an intended tamper protection mechanism by deleting the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Sophos Endpoint Defense\ registry key.
Sophos Endpoint Protection 10.7
1 EDB exploit
NA
CVE-2013-2271
The D-Link DSL-2740B Gateway with firmware EU_1.0, when an active administrator session exists, allows remote malicious users to bypass authentication and gain administrator access via a request to login.cgi.
Dlink Dsl-2740b Firmware -
Dlink Dsl-2740b -
1 EDB exploit
NA
CVE-2014-88262
A malicious Jar file can bypass all OS X Gatekeeper warnings and protections, allowing a remote attacker to execute arbitrary unsigned code downloaded by the user. Java must be installed on the victim's machine.
9.8
CVSSv3
CVE-2021-43136
An authentication bypass issue in FormaLMS <= 2.4.4 allows an malicious user to bypass the authentication mechanism and obtain a valid access to the platform.
Formalms Formalms
9.8
CVSSv3
CVE-2022-2651
Authentication Bypass by Primary Weakness in GitHub repository bookwyrm-social/bookwyrm before 0.4.5.
Joinbookwyrm Bookwyrm
NA
CVE-2012-6626
SQL injection vulnerability in verify-user.php in b2ePMS 1.0 allows remote malicious users to execute arbitrary SQL commands via the username field.
Brian Cabunac Browser To Email Phone Message System 1.0
1 EDB exploit
NA
CVE-2006-0153
427BB 2.2 and 2.2.1 verifies authentication credentials based on the username, authenticated, and usertype cookies, which allows remote malicious users to bypass authentication by using a valid username and usertype and setting the authenticated cookie.
427bb Fourtwosevenbb 2.2
427bb Fourtwosevenbb 2.2.1
1 EDB exploit
NA
CVE-2010-1046
Multiple SQL injection vulnerabilities in index.php in Rostermain 1.1 and previous versions allow remote malicious users to execute arbitrary SQL commands via the (1) userid (username) and (2) password parameters.
Ryan Marshall Rostermain
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »