Vulnerabilities > Authorization Bypass Through User-Controlled Key
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-06-07 | CVE-2024-5438 | Authorization Bypass Through User-Controlled Key vulnerability in Themeum Tutor LMS The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.7.1 via the 'attempt_delete' function due to missing validation on a user controlled key. | 4.3 |
2024-06-06 | CVE-2024-36399 | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard Kanboard is project management software that focuses on the Kanban methodology. | 6.3 |
2024-06-05 | CVE-2024-4886 | Authorization Bypass Through User-Controlled Key vulnerability in Buddyboss Platform The contains an IDOR vulnerability that allows a user to comment on a private post by manipulating the ID included in the request | 4.3 |
2024-05-21 | CVE-2024-4154 | Authorization Bypass Through User-Controlled Key vulnerability in Lunary In lunary-ai/lunary version 1.2.2, an incorrect synchronization vulnerability allows unprivileged users to rename projects they do not have access to. | 6.5 |
2024-05-20 | CVE-2024-4151 | Authorization Bypass Through User-Controlled Key vulnerability in Lunary An Improper Access Control vulnerability exists in lunary-ai/lunary version 1.2.2, where users can view and update any prompts in any projects due to insufficient access control checks in the handling of PATCH and GET requests for template versions. | 8.1 |
2024-05-16 | CVE-2024-4279 | Authorization Bypass Through User-Controlled Key vulnerability in Themeum Tutor LMS The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference to Arbitrary Course Deletion in versions up to, and including, 2.7.0 via the 'tutor_course_delete' function due to missing validation on a user controlled key. | 6.5 |
2024-05-14 | CVE-2024-4817 | Authorization Bypass Through User-Controlled Key vulnerability in Campcodes Online Laundry Management System 1.0 A vulnerability has been found in Campcodes Online Laundry Management System 1.0 and classified as critical. | 8.8 |
2024-05-14 | CVE-2024-4819 | Authorization Bypass Through User-Controlled Key vulnerability in Campcodes Online Laundry Management System 1.0 A vulnerability was found in Campcodes Online Laundry Management System 1.0. | 8.8 |
2024-04-16 | CVE-2024-1626 | Authorization Bypass Through User-Controlled Key vulnerability in Lunary An Insecure Direct Object Reference (IDOR) vulnerability exists in the lunary-ai/lunary repository, version 0.3.0, within the project update endpoint. | 8.1 |
2024-04-15 | CVE-2023-45808 | Authorization Bypass Through User-Controlled Key vulnerability in Combodo Itop iTop is an IT service management platform. | 5.4 |