Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2023-10-31 CVE-2023-4836 Authorization Bypass Through User-Controlled Key vulnerability in Userprivatefiles Wordpress File Sharing Plugin
The WordPress File Sharing Plugin WordPress plugin before 2.0.5 does not check authorization before displaying files and folders, allowing users to gain access to those filed by manipulating IDs which can easily be brute forced
network
low complexity
userprivatefiles CWE-639
4.3
2023-10-30 CVE-2023-46478 Authorization Bypass Through User-Controlled Key vulnerability in Minical 1.0.0
An issue in minCal v.1.0.0 allows a remote attacker to execute arbitrary code via a crafted script to the customer_data parameter.
network
low complexity
minical CWE-639
8.8
2023-10-19 CVE-2022-24400 Authorization Bypass Through User-Controlled Key vulnerability in Midnightblue Tetra:Burst
A flaw in the TETRA authentication procecure allows a MITM adversary that can predict the MS challenge RAND2 to set session key DCK to zero.
high complexity
midnightblue CWE-639
5.9
2023-10-19 CVE-2022-24401 Authorization Bypass Through User-Controlled Key vulnerability in Midnightblue Tetra:Burst
Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator.
low complexity
midnightblue CWE-639
8.1
2023-10-16 CVE-2023-43668 Authorization Bypass Through User-Controlled Key vulnerability in Apache Inlong
Authorization Bypass Through User-Controlled Key vulnerability in Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.8.0,  some sensitive params checks will be bypassed, like "autoDeserizalize","allowLoadLocalInfile".... .   Users are advised to upgrade to Apache InLong's 1.9.0 or cherry-pick [1] to solve it. [1]  https://github.com/apache/inlong/pull/8604
network
low complexity
apache CWE-639
critical
9.8
2023-10-13 CVE-2023-45393 Authorization Bypass Through User-Controlled Key vulnerability in Grandingteco Utime Master 9.0.7
An indirect object reference (IDOR) in GRANDING UTime Master v9.0.7-Build:Apr 4,2023 allows authenticated attackers to access sensitive information via a crafted cookie.
network
low complexity
grandingteco CWE-639
6.5
2023-10-11 CVE-2023-45396 Authorization Bypass Through User-Controlled Key vulnerability in Elenos Etg150 Firmware 3.12
An Insecure Direct Object Reference (IDOR) vulnerability leads to events profiles access in Elenos ETG150 FM transmitter running on version 3.12.
network
low complexity
elenos CWE-639
6.5
2023-10-11 CVE-2023-44981 Authorization Bypass Through User-Controlled Key vulnerability in multiple products
Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper.
network
low complexity
apache debian CWE-639
critical
9.1
2023-10-10 CVE-2023-44249 Authorization Bypass Through User-Controlled Key vulnerability in Fortinet Fortianalyzer and Fortimanager
An authorization bypass through user-controlled key [CWE-639] vulnerability in Fortinet FortiManager version 7.4.0 and before 7.2.3 and FortiAnalyzer version 7.4.0 and before 7.2.3 allows a remote attacker with low privileges to read sensitive information via crafted HTTP requests.
network
low complexity
fortinet CWE-639
6.5
2023-10-09 CVE-2023-42455 Authorization Bypass Through User-Controlled Key vulnerability in Wazuh Wazuh-Dashboard and Wazuh-Kibana-App
Wazuh is a security detection, visibility, and compliance open source project.
network
low complexity
wazuh CWE-639
8.8