Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2024-06-07 CVE-2024-5438 Authorization Bypass Through User-Controlled Key vulnerability in Themeum Tutor LMS
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.7.1 via the 'attempt_delete' function due to missing validation on a user controlled key.
network
low complexity
themeum CWE-639
4.3
2024-06-05 CVE-2024-4886 Authorization Bypass Through User-Controlled Key vulnerability in Buddyboss Platform
The contains an IDOR vulnerability that allows a user to comment on a private post by manipulating the ID included in the request
network
low complexity
buddyboss CWE-639
4.3
2024-05-14 CVE-2023-40720 Authorization Bypass Through User-Controlled Key vulnerability in Fortinet Fortivoice
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
network
low complexity
fortinet CWE-639
7.1
2024-04-05 CVE-2023-6523 Authorization Bypass Through User-Controlled Key vulnerability in ExtremePacs Extreme XDS allows Authentication Abuse.This issue affects Extreme XDS: before 3914.
network
low complexity
CWE-639
8.8
2024-03-12 CVE-2024-23112 Authorization Bypass Through User-Controlled Key vulnerability in Fortinet Fortios and Fortiproxy
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmark via URL manipulation.
network
low complexity
fortinet CWE-639
4.3
2024-02-09 CVE-2023-6724 Authorization Bypass Through User-Controlled Key vulnerability in Simgesel Hearing Tracking System
Authorization Bypass Through User-Controlled Key vulnerability in Software Engineering Consultancy Machine Equipment Limited Company Hearing Tracking System allows Authentication Abuse.This issue affects Hearing Tracking System: before for IOS 7.0, for Android Latest release 1.0.
network
low complexity
simgesel CWE-639
8.8
2024-02-08 CVE-2023-6515 Authorization Bypass Through User-Controlled Key vulnerability in Miateknoloji Mia-Med 1.0.0.58
Authorization Bypass Through User-Controlled Key vulnerability in Mia Technology Inc.
network
low complexity
miateknoloji CWE-639
8.8
2024-02-05 CVE-2024-0366 Authorization Bypass Through User-Controlled Key vulnerability in Squirrly Starbox
The Starbox – the Author Box for Humans plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.4.7 via the action function due to missing validation on a user controlled key.
network
low complexity
squirrly CWE-639
4.3
2024-02-05 CVE-2023-6983 Authorization Bypass Through User-Controlled Key vulnerability in Josevega Display Custom Fields in the Frontend - Post and User Profile Fields
The Display custom fields in the frontend – Post and User Profile Fields plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.2.1 via the vg_display_data shortcode due to missing validation on a user controlled key.
network
low complexity
josevega CWE-639
4.3
2024-01-31 CVE-2024-22305 Authorization Bypass Through User-Controlled Key vulnerability in Kaliforms Kali Forms
Authorization Bypass Through User-Controlled Key vulnerability in ali Forms Contact Form builder with drag & drop for WordPress – Kali Forms.This issue affects Contact Form builder with drag & drop for WordPress – Kali Forms: from n/a through 2.3.36.
network
low complexity
kaliforms CWE-639
8.1