Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2021-10-14 CVE-2021-36389 Authorization Bypass Through User-Controlled Key vulnerability in Yellowfinbi Yellowfin
In Yellowfin before 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4".
network
low complexity
yellowfinbi CWE-639
5.0
2021-10-05 CVE-2021-41120 Authorization Bypass Through User-Controlled Key vulnerability in Sylius Paypal
sylius/paypal-plugin is a paypal plugin for the Sylius development platform.
network
low complexity
sylius CWE-639
5.0
2021-10-05 CVE-2021-39889 Authorization Bypass Through User-Controlled Key vulnerability in Gitlab
In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch name to a malicious user who makes a crafted API call with the ID of the protected branch.
network
low complexity
gitlab CWE-639
4.0
2021-10-04 CVE-2021-37331 Authorization Bypass Through User-Controlled Key vulnerability in Bookingcore Booking Core 2.0
Laravel Booking System Booking Core 2.0 is vulnerable to Incorrect Access Control.
network
low complexity
bookingcore CWE-639
5.0
2021-10-04 CVE-2021-37777 Authorization Bypass Through User-Controlled Key vulnerability in Gilacms Gila CMS 2.2.0
Gila CMS 2.2.0 is vulnerable to Insecure Direct Object Reference (IDOR).
network
low complexity
gilacms CWE-639
5.0
2021-10-01 CVE-2021-41847 Authorization Bypass Through User-Controlled Key vulnerability in 3Xlogic Infinias Access Control 6.7.10708.0
An issue was discovered in 3xLogic Infinias Access Control through 6.7.10708.0, affecting physical security.
network
low complexity
3xlogic CWE-639
6.5
2021-09-30 CVE-2021-41298 Authorization Bypass Through User-Controlled Key vulnerability in Ecoa products
ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input.
network
low complexity
ecoa CWE-639
6.5
2021-09-30 CVE-2021-41301 Authorization Bypass Through User-Controlled Key vulnerability in Ecoa products
ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request.
network
low complexity
ecoa CWE-639
critical
10.0
2021-09-27 CVE-2021-36874 Authorization Bypass Through User-Controlled Key vulnerability in Stylemixthemes Ulisting
Authenticated Insecure Direct Object References (IDOR) vulnerability in WordPress uListing plugin (versions <= 2.0.5).
network
low complexity
stylemixthemes CWE-639
6.5
2021-09-15 CVE-2021-29773 Authorization Bypass Through User-Controlled Key vulnerability in IBM Security Guardium 10.6/11.3
IBM Security Guardium 10.6 and 11.3 could allow a remote authenticated attacker to obtain sensitive information or modify user details caused by an insecure direct object vulnerability (IDOR).
network
low complexity
ibm CWE-639
5.5