Robuta

https://auth0.com/docs/secure/security-guidance/security-bulletins/cve-2018-11537
CVE-2018-11537: Security Update for angular-jwt Allow List Bypass
security updateallow listcveangularjwt
https://www.exploit-db.com/exploits/32167
8E6 Technologies R3000 - Host Header Internet Filter Security Bypass. CVE-2008-3494CVE-47517 . remote exploit for Multiple platform
internet filtersecurity bypasstechnologieshostheader
https://www.helpnetsecurity.com/2013/03/29/spammers-bypass-spam-filters-with-google-translate-links/
Google Translate is the latest trick in spammers' arsenal for bypassing email spam filters, warn Barracuda Labs researchers. Spam filters work by
spam filtersgoogle translatespammersbypasslinks
https://www.sophos.com/de-de/blog/tag/security-feature-bypass
securityfeaturebypassblog
https://www.jamf.com/blog/tcc-bypass-steals-data-from-icloud/
Jamf discovered a vulnerability that affects iOS and macOS users that is capable of stealing data from iCloud, bypassing TCC protections.
security frameworkcvetccbypassvulnerability
https://portswigger.net/web-security/cross-site-scripting/exploiting/lab-perform-csrf
This lab contains a stored XSS vulnerability in the blog comments function. To solve the lab, exploit the vulnerability to steal a CSRF token, which you can ...
web securitylabexploitingxssbypass
https://www.itpro.com/182871/staff-forced-to-bypass-security-controls
Inappropriate policies and procedures are leading over two-thirds of employees to break security controls in order to do their jobs, a survey has found.
bypass securitystaffforcedcontrolspro
https://www.helpnetsecurity.com/2014/10/23/attackers-bypass-sandworm-patch-with-new-0-day/
The Sandworm vulnerability has been patched, but unfortunately attackers have discovered a way to bypass the patch and continue with their targeted
attackersbypasssandwormpatchnew
https://openwall.com/lists/oss-security/2014/11/20/12
osssecuritylinuxusernamespaces
https://sputnikglobe.com/20200723/us-investors-could-purchase-tiktok-to-bypass-national-security-concerns-over-chinese-ownership-1079967367.html
The application TikTok has drawn widespread controversy as relations between the United States and China begin to sour. The Trump administration accuses the......
us investorsnational securitycouldpurchasetiktok
https://www.gigabyte.com/Support/Security/2273
Giga Computing Technology Co., Ltd. is aware of the recently disclosed BMC&C vulnerability by Eclypsium, identified as CVE-2024-54085, with a CVSS v4.0 ...
authentication bypasstechnical advisoryamimegaracspx
https://openwall.com/lists/oss-security/2018/03/24/6
osssecuritycvebypasstrailing
https://www.dnsfilter.com/newsroom/major-threat-vector-students-bypassing-security-controls
Data from the DNSFilter's networks reveals the growing risks posed by misused web proxies and filter-avoidance tools in schools. Learn more.
threat vectorbypass securitymajorstudentscontrols
https://www.godaddy.com/en-au/help/prevent-web-application-firewall-waf-bypass-32308
Learn how to disable firewall bypass.
web application firewallwebsite securitypreventwafbypass
https://www.helpnetsecurity.com/2016/08/08/malware-digitally-signed-executables/
It's possible to hide malicious code in digitally signed executables without invalidating the certificate, and execute this code without triggering AV.
digitally signedmalwarehiddenexecutablesbypass
https://www.sentinelone.com/blog/5-common-cyber-security-threats-that-bypass-legacy-av/
Is it time to replace your legacy endpoint protection? Find out by seeing if your AV can handle these five common threats
cyber security threatscommonbypasslegacyav
https://portswigger.net/web-security/jwt/lab-jwt-authentication-bypass-via-jku-header-injection
This lab uses a JWT-based mechanism for handling sessions. The server supports the jku parameter in the JWT header. However, it fails to check whether the ...
authentication bypassweb securitylabjwtvia
https://www.fujitsu.com/global/support/products/software/security/products-f/ifsa-201701e.html
Vulnerability in TPM produced by Infineon Technologies AG could allow Security Feature Bypass
infineon technologies agvulnerabilitytpmproducedcould
https://support.mozilla.org/zh-CN/questions/1510514
website accesssecurity issueduepotentialerror
https://traefik.io/blog/security-alert-how-attackers-can-bypass-next-js-middleware-with-a-single-http-header
Recently, a critical vulnerability (CVE-2025-29927) was disclosed in the popular Next.js framework, allowing attackers to circumvent middleware...
security alertnext jsattackersbypassmiddleware
https://www.netgear.com/no/about/security/kb/cve-2015-8289-authentication-bypass/
authentication bypasssecurity advisorycvekbus
https://www.exploit-db.com/exploits/5319
AuraCMS 2.x - '/user.php' Security Code Bypass / Arbitrary Add Administrator. CVE-43963CVE-2008-1715 . webapps exploit for PHP platform
php securityxusercodebypass
https://www.slashgear.com/fail0verflow-hacker-group-discovers-epic-ps3-security-bypass-30122000/
A big part of what makes the Gauntlet great is how it weaves through a roster of heroes and villains bold enough to take control of it. So let's talk about...
hacker groupsecurity bypassdiscoversepic
https://www.openwall.com/lists/oss-security/2009/04/07/6
osssecuritycverequestclamav
https://www.openwall.com/lists/oss-security/2026/01/20/4
apache solrosssecuritycveunauthorized
https://www.openwall.com/lists/oss-security/2022/10/18/3
osssecuritycveapachedubbo
https://dftsocial.com/story20536621/bypass-security-hire-a-discreet-hacker
bypass securityhirediscreethacker