Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2023-09-20 CVE-2023-42334 Authorization Bypass Through User-Controlled Key vulnerability in Fl3Xx Crew and Dispatch
An Indirect Object Reference (IDOR) in Fl3xx Dispatch 2.10.37 and fl3xx Crew 2.10.37 allows a remote attacker to escalate privileges via the user parameter.
network
low complexity
fl3xx CWE-639
6.5
2023-09-13 CVE-2023-4213 Authorization Bypass Through User-Controlled Key vulnerability in Mikevanwinkle Simplr Registration Form Plus+
The Simplr Registration Form Plus+ plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 2.4.5.
network
low complexity
mikevanwinkle CWE-639
8.8
2023-09-12 CVE-2023-41368 Authorization Bypass Through User-Controlled Key vulnerability in SAP S/4 Hana
The OData service of the S4 HANA (Manage checkbook apps) - versions 102, 103, 104, 105, 106, 107, allows an attacker to change the checkbook name by simulating an update OData call.
network
low complexity
sap CWE-639
5.3
2023-09-06 CVE-2020-10130 Authorization Bypass Through User-Controlled Key vulnerability in Searchblox
SearchBlox before Version 9.1 is vulnerable to business logic bypass where the user is able to create multiple super admin users in the system.
network
low complexity
searchblox CWE-639
8.8
2023-09-04 CVE-2023-4587 Authorization Bypass Through User-Controlled Key vulnerability in Zkteco Zem800 Firmware 6.60
An IDOR vulnerability has been found in ZKTeco ZEM800 product affecting version 6.60.
local
low complexity
zkteco CWE-639
5.5
2023-08-24 CVE-2023-32078 Authorization Bypass Through User-Controlled Key vulnerability in Gravitl Netmaker
Netmaker makes networks with WireGuard.
network
low complexity
gravitl CWE-639
7.5
2023-08-14 CVE-2023-28481 Authorization Bypass Through User-Controlled Key vulnerability in Tigergraph 3.7.0
An issue was discovered in Tigergraph Enterprise 3.7.0.
network
low complexity
tigergraph CWE-639
8.8
2023-08-10 CVE-2023-37543 Authorization Bypass Through User-Controlled Key vulnerability in Cacti
Cacti before 1.2.6 allows IDOR (Insecure Direct Object Reference) for accessing any graph via a modified local_graph_id parameter to graph_xport.php.
network
low complexity
cacti CWE-639
7.5
2023-07-17 CVE-2023-2958 Authorization Bypass Through User-Controlled Key vulnerability in Orjinyazilim ATS PRO
Authorization Bypass Through User-Controlled Key vulnerability in Origin Software ATS Pro allows Authentication Abuse, Authentication Bypass.This issue affects ATS Pro: before 20230714.
network
low complexity
orjinyazilim CWE-639
critical
9.8
2023-07-17 CVE-2023-3700 Authorization Bypass Through User-Controlled Key vulnerability in Easyappointments
Authorization Bypass Through User-Controlled Key in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
network
low complexity
easyappointments CWE-639
4.3