Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2020-12-30 CVE-2020-35849 Authorization Bypass Through User-Controlled Key vulnerability in Mantisbt
An issue was discovered in MantisBT before 2.24.4.
network
low complexity
mantisbt CWE-639
7.5
2020-12-27 CVE-2020-29156 Authorization Bypass Through User-Controlled Key vulnerability in Woocommerce
The WooCommerce plugin before 4.7.0 for WordPress allows remote attackers to view the status of arbitrary orders via the order_id parameter in a fetch_order_status action.
network
low complexity
woocommerce CWE-639
5.3
2020-12-18 CVE-2020-26178 Authorization Bypass Through User-Controlled Key vulnerability in Tangro Business Workflow 1.17.5
In tangro Business Workflow before 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated.
network
low complexity
tangro CWE-639
5.3
2020-12-18 CVE-2020-26175 Authorization Bypass Through User-Controlled Key vulnerability in Tangro Business Workflow 1.17.5
In tangro Business Workflow before 1.18.1, an attacker can manipulate the value of PERSON in requests to /api/profile in order to change profile information of other users.
network
low complexity
tangro CWE-639
6.5
2020-12-18 CVE-2020-26173 Authorization Bypass Through User-Controlled Key vulnerability in Tangro Business Workflow 1.17.5
An incorrect access control implementation in Tangro Business Workflow before 1.18.1 allows an attacker to download documents (PDF) by providing a valid document ID and token.
network
low complexity
tangro CWE-639
4.3
2020-12-18 CVE-2020-26171 Authorization Bypass Through User-Controlled Key vulnerability in Tangro Business Workflow 1.17.5
In tangro Business Workflow before 1.18.1, the documentId of attachment uploads to /api/document/attachments/upload can be manipulated.
network
low complexity
tangro CWE-639
4.3
2020-12-14 CVE-2020-20183 Authorization Bypass Through User-Controlled Key vulnerability in Zyxel P1302-T10 V3 Firmware 2.00
Insecure direct object reference vulnerability in Zyxel’s P1302-T10 v3 with firmware version 2.00(ABBX.3) and earlier allows attackers to gain privileges and access certain admin pages.
network
low complexity
zyxel CWE-639
7.5
2020-12-11 CVE-2020-13357 Authorization Bypass Through User-Controlled Key vulnerability in Gitlab
An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.
network
low complexity
gitlab CWE-639
4.3
2020-11-26 CVE-2020-27663 Authorization Bypass Through User-Controlled Key vulnerability in Glpi-Project Glpi
In GLPI before 9.5.3, ajax/getDropdownValue.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any itemType (e.g., Ticket, Users, etc.).
network
low complexity
glpi-project CWE-639
4.3
2020-11-26 CVE-2020-27662 Authorization Bypass Through User-Controlled Key vulnerability in Glpi-Project Glpi
In GLPI before 9.5.3, ajax/comments.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any database table (e.g., glpi_tickets, glpi_users, etc.).
network
low complexity
glpi-project CWE-639
4.3