Vulnerabilities > Authorization Bypass Through User-Controlled Key
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-09-15 | CVE-2021-38624 | Authorization Bypass Through User-Controlled Key vulnerability in Microsoft products Windows Key Storage Provider Security Feature Bypass Vulnerability | 6.5 |
2021-09-14 | CVE-2021-37184 | Authorization Bypass Through User-Controlled Key vulnerability in Siemens Industrial Edge Management A vulnerability has been identified in Industrial Edge Management (All versions < V1.3). | 6.8 |
2021-09-14 | CVE-2021-40355 | Authorization Bypass Through User-Controlled Key vulnerability in Siemens Teamcenter Visualization A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.8), Teamcenter V13.0 (All versions < V13.0.0.7), Teamcenter V13.1 (All versions < V13.1.0.5), Teamcenter V13.2 (All versions < 13.2.0.2). | 6.5 |
2021-09-08 | CVE-2021-33981 | Authorization Bypass Through User-Controlled Key vulnerability in Myfwc Fish | Hunt FL An insecure, direct object vulnerability in hunting/fishing license retrieval function of the "Fish | Hunt FL" iOS app versions 3.8.0 and earlier allows a remote authenticated attacker to retrieve other people's personal information and images of their hunting/fishing licenses. | 4.0 |
2021-09-07 | CVE-2021-37628 | Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Richdocuments Nextcloud Richdocuments is an open source collaborative office suite. | 5.0 |
2021-09-07 | CVE-2021-37630 | Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Circles Nextcloud Circles is an open source social network built for the nextcloud ecosystem. | 4.0 |
2021-09-07 | CVE-2021-37631 | Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Deck Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. | 4.0 |
2021-09-01 | CVE-2021-36032 | Authorization Bypass Through User-Controlled Key vulnerability in Adobe Commerce and Magento Open Source Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability. | 8.8 |
2021-09-01 | CVE-2021-40352 | Authorization Bypass Through User-Controlled Key vulnerability in Open-Emr Openemr 6.0.0 OpenEMR 6.0.0 has a pnotes_print.php?noteid= Insecure Direct Object Reference vulnerability via which an attacker can read the messages of all users. | 4.0 |
2021-08-30 | CVE-2021-22023 | Authorization Bypass Through User-Controlled Key vulnerability in VMWare products The vRealize Operations Manager API (8.x prior to 8.5) has insecure object reference vulnerability. | 6.5 |