Vulnerabilities > Authorization Bypass Through User-Controlled Key
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-10-14 | CVE-2021-36389 | Authorization Bypass Through User-Controlled Key vulnerability in Yellowfinbi Yellowfin In Yellowfin before 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4". | 5.0 |
2021-10-05 | CVE-2021-41120 | Authorization Bypass Through User-Controlled Key vulnerability in Sylius Paypal sylius/paypal-plugin is a paypal plugin for the Sylius development platform. | 5.0 |
2021-10-05 | CVE-2021-39889 | Authorization Bypass Through User-Controlled Key vulnerability in Gitlab In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch name to a malicious user who makes a crafted API call with the ID of the protected branch. | 4.0 |
2021-10-04 | CVE-2021-37331 | Authorization Bypass Through User-Controlled Key vulnerability in Bookingcore Booking Core 2.0 Laravel Booking System Booking Core 2.0 is vulnerable to Incorrect Access Control. | 5.0 |
2021-10-04 | CVE-2021-37777 | Authorization Bypass Through User-Controlled Key vulnerability in Gilacms Gila CMS 2.2.0 Gila CMS 2.2.0 is vulnerable to Insecure Direct Object Reference (IDOR). | 5.0 |
2021-10-01 | CVE-2021-41847 | Authorization Bypass Through User-Controlled Key vulnerability in 3Xlogic Infinias Access Control 6.7.10708.0 An issue was discovered in 3xLogic Infinias Access Control through 6.7.10708.0, affecting physical security. | 6.5 |
2021-09-30 | CVE-2021-41298 | Authorization Bypass Through User-Controlled Key vulnerability in Ecoa products ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. | 6.5 |
2021-09-30 | CVE-2021-41301 | Authorization Bypass Through User-Controlled Key vulnerability in Ecoa products ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. | 10.0 |
2021-09-27 | CVE-2021-36874 | Authorization Bypass Through User-Controlled Key vulnerability in Stylemixthemes Ulisting Authenticated Insecure Direct Object References (IDOR) vulnerability in WordPress uListing plugin (versions <= 2.0.5). | 6.5 |
2021-09-15 | CVE-2021-29773 | Authorization Bypass Through User-Controlled Key vulnerability in IBM Security Guardium 10.6/11.3 IBM Security Guardium 10.6 and 11.3 could allow a remote authenticated attacker to obtain sensitive information or modify user details caused by an insecure direct object vulnerability (IDOR). | 5.5 |