Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2020-07-13 CVE-2020-14174 Authorization Bypass Through User-Controlled Key vulnerability in Atlassian products
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to view titles of a private project via an Insecure Direct Object References (IDOR) vulnerability in the Administration Permission Helper.
network
low complexity
atlassian CWE-639
4.0
2020-07-01 CVE-2019-15310 Authorization Bypass Through User-Controlled Key vulnerability in Linkplay
An issue was discovered on various devices via the Linkplay firmware.
network
low complexity
linkplay CWE-639
critical
10.0
2020-05-12 CVE-2020-8154 Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Server
An Insecure direct object reference vulnerability in Nextcloud Server 18.0.2 allowed an attacker to remote wipe devices of other users when sending a malicious request directly to the endpoint.
network
low complexity
nextcloud CWE-639
7.7
2020-04-29 CVE-2020-11009 Authorization Bypass Through User-Controlled Key vulnerability in Pagerduty Rundeck
In Rundeck before version 3.2.6, authenticated users can craft a request that reveals Execution data and logs and Job details that they are not authorized to see.
network
low complexity
pagerduty CWE-639
4.0
2020-04-15 CVE-2020-11659 Authorization Bypass Through User-Controlled Key vulnerability in Broadcom CA API Developer Portal
CA API Developer Portal 4.3.1 and earlier contains an access control flaw that allows privileged users to perform a restricted user administration action.
network
low complexity
broadcom CWE-639
4.0
2020-04-15 CVE-2020-11658 Authorization Bypass Through User-Controlled Key vulnerability in Broadcom CA API Developer Portal
CA API Developer Portal 4.3.1 and earlier handles shared secret keys in an insecure manner, which allows attackers to bypass authorization.
network
low complexity
broadcom CWE-639
7.5
2020-04-14 CVE-2020-9384 Authorization Bypass Through User-Controlled Key vulnerability in Subex ROC Partner Settlement 10.5
An Insecure Direct Object Reference (IDOR) vulnerability in the Change Password feature of Subex ROC Partner Settlement 10.5 allows remote authenticated users to achieve account takeover via manipulation of POST parameters.
network
low complexity
subex CWE-639
8.8
2020-03-27 CVE-2020-7918 Authorization Bypass Through User-Controlled Key vulnerability in Totemo Totemomail 7.0.0
An insecure direct object reference in webmail in totemo totemomail 7.0.0 allows an authenticated remote user to read and modify mail folder names of other users via enumeration.
network
low complexity
totemo CWE-639
5.5
2020-03-21 CVE-2020-10800 Authorization Bypass Through User-Controlled Key vulnerability in LIX Project LIX
lix through 15.8.7 allows man-in-the-middle attackers to execute arbitrary code by modifying the HTTP client-server data stream so that the Location header is associated with attacker-controlled executable content in the postDownload field.
6.8
2020-03-02 CVE-2020-5539 Authorization Bypass Through User-Controlled Key vulnerability in Grandit
GRANDIT Ver.1.6, Ver.2.0, Ver.2.1, Ver.2.2, Ver.2.3, and Ver.3.0 do not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and then alter or disclose the information via unspecified vectors.
network
low complexity
grandit CWE-639
6.4