Authentication Bypass

Authentication Bypass vulnerabilities allow attackers to circumvent authentication mechanisms and gain unauthorized access to systems or data without valid credentials.

Total CVEs

2

Typical Severity

CRITICAL

Category

Auth/Session

Understanding Authentication Bypass

Detailed information about this vulnerability type.

How to Identify

  • Review security advisories
  • Perform regular security testing

Prevention Best Practices

  • Follow security best practices
  • Keep systems updated

Authentication Bypass CVEs (2)

DescriptionVendor / ProductExploit Status
CVE-2026-16188.8

This vulnerability allows an attacker to gain higher access privileges in the FlexCity/Kiosk software, potentially letting them control the system without proper authentication. It affects versions before 1.0.36, meaning anyone using an older version is at risk.

Unknown
Exploit Available
7 days agoFeb 13, 2026
CVE-2019-127497.1

This vulnerability allows an attacker to trick a system into thinking they are a different user, potentially gaining unauthorized access to sensitive data or functions. To exploit this, the attacker needs write access to their own home directory and can manipulate a specific file to bypass authentication checks.

freedesktopdbus
Exploit Available
over 6 years agoJun 11, 2019