Authentication Bypass
Authentication Bypass vulnerabilities allow attackers to circumvent authentication mechanisms and gain unauthorized access to systems or data without valid credentials.
2
CRITICAL
Auth/Session
Understanding Authentication Bypass
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Authentication Bypass CVEs (2)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-1618 | 8.8 | This vulnerability allows an attacker to gain higher access privileges in the FlexCity/Kiosk software, potentially letting them control the system without proper authentication. It affects versions before 1.0.36, meaning anyone using an older version is at risk. | Unknown | Exploit Available | 7 days agoFeb 13, 2026 |
| CVE-2019-12749 | 7.1 | This vulnerability allows an attacker to trick a system into thinking they are a different user, potentially gaining unauthorized access to sensitive data or functions. To exploit this, the attacker needs write access to their own home directory and can manipulate a specific file to bypass authentication checks. | freedesktopdbus | Exploit Available | over 6 years agoJun 11, 2019 |