Vulnerabilities > Authorization Bypass Through User-Controlled Key
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-10-18 | CVE-2022-41479 | Authorization Bypass Through User-Controlled Key vulnerability in Devexpress Asp.Net web Forms Controls 19.2.3 The DevExpress Resource Handler (ASPxHttpHandlerModule) in DevExpress ASP.NET Web Forms Build v19.2.3 does not verify the referenced objects in the /DXR.axd?r= HTTP GET parameter. | 7.5 |
2022-10-17 | CVE-2022-3331 | Authorization Bypass Through User-Controlled Key vulnerability in Gitlab An issue has been discovered in GitLab EE affecting all versions starting from 14.5 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. | 4.3 |
2022-10-17 | CVE-2022-3282 | Authorization Bypass Through User-Controlled Key vulnerability in Codedropz Drag and Drop multiple File Upload - Contact Form 7 The Drag and Drop Multiple File Upload WordPress plugin before 1.3.6.5 does not properly check for the upload size limit set in forms, taking the value from user input sent when submitting the form. | 4.3 |
2022-10-14 | CVE-2022-42067 | Authorization Bypass Through User-Controlled Key vulnerability in Online Birth Certificate Management System Project Online Birth Certificate Management System 1.0 Online Birth Certificate Management System version 1.0 suffers from an Insecure Direct Object Reference (IDOR) vulnerability | 4.3 |
2022-10-13 | CVE-2022-2828 | Authorization Bypass Through User-Controlled Key vulnerability in Octopus Server In affected versions of Octopus Server it is possible to reveal information about teams via the API due to an Insecure Direct Object Reference (IDOR) vulnerability | 6.5 |
2022-09-30 | CVE-2021-36865 | Authorization Bypass Through User-Controlled Key vulnerability in Quizandsurveymaster Quiz and Survey Master Insecure direct object references (IDOR) vulnerability in ExpressTech Quiz And Survey Master plugin <= 7.3.4 at WordPress allows attackers to change the content of the quiz. | 4.3 |
2022-09-26 | CVE-2022-1613 | Authorization Bypass Through User-Controlled Key vulnerability in 10Up Restricted Site Access The Restricted Site Access WordPress plugin before 7.3.2 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations in certain situations. | 5.3 |
2022-09-15 | CVE-2022-38789 | Authorization Bypass Through User-Controlled Key vulnerability in Airties products An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. | 9.1 |
2022-09-07 | CVE-2022-36539 | Authorization Bypass Through User-Controlled Key vulnerability in Eigen&Wijzer Ouderapp Project Eigen&Wijzer Ouderapp WeDayCare B.V Ouderapp before v1.1.22 allows attackers to alter the ID value within intercepted calls to gain access to data of other parents and children. | 7.5 |
2022-09-06 | CVE-2022-32277 | Authorization Bypass Through User-Controlled Key vulnerability in Squiz Matrix 6.20 Squiz Matrix CMS 6.20 is vulnerable to an Insecure Direct Object Reference caused by failure to correctly validate authorization when submitting a request to change a user's contact details. | 5.3 |