Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2021-07-21 CVE-2021-32744 Authorization Bypass Through User-Controlled Key vulnerability in Collabora Online
Collabora Online is a collaborative online office suite.
network
low complexity
collabora CWE-639
7.5
2021-07-01 CVE-2021-35337 Authorization Bypass Through User-Controlled Key vulnerability in Phone Shop Sales Management System Project Phone Shop Sales Management System 1.0
Sourcecodester Phone Shop Sales Managements System 1.0 is vulnerable to Insecure Direct Object Reference (IDOR).
4.3
2021-06-11 CVE-2021-22906 Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud End-To-End Encryption
Nextcloud End-to-End Encryption before 1.5.3, 1.6.3 and 1.7.1 suffers from a denial of service vulnerability due to permitting any authenticated users to lock files of other users.
network
low complexity
nextcloud CWE-639
6.5
2021-06-10 CVE-2021-31927 Authorization Bypass Through User-Controlled Key vulnerability in Annexcloud Loyalty Experience Platform
An Insecure Direct Object Reference (IDOR) vulnerability in Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to modify any existing user, including users assigned to different environments and clients.
network
low complexity
annexcloud CWE-639
4.3
2021-06-02 CVE-2020-6641 Authorization Bypass Through User-Controlled Key vulnerability in Fortinet Fortipresence
Two authorization bypass through user-controlled key vulnerabilities in the Fortinet FortiPresence 2.1.0 administration interface may allow an attacker to gain access to some user data via portal manager or portal users parameters.
network
low complexity
fortinet CWE-639
4.3
2021-06-01 CVE-2021-24318 Authorization Bypass Through User-Controlled Key vulnerability in Purethemes Listeo
The Listeo WordPress theme before 1.6.11 did not ensure that the Post/Page and Booking to delete belong to the user making the request, allowing any authenticated users to delete arbitrary page/post and booking via an IDOR vector.
network
low complexity
purethemes CWE-639
6.5
2021-05-26 CVE-2020-26679 Authorization Bypass Through User-Controlled Key vulnerability in Vfairs 3.3
vFairs 3.3 is affected by Insecure Permissions.
network
low complexity
vfairs CWE-639
4.3
2021-05-07 CVE-2020-36126 Authorization Bypass Through User-Controlled Key vulnerability in Paxtechnology Paxstore 7.0.820200511171508
Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control that can lead to remote privilege escalation.
network
low complexity
paxtechnology CWE-639
8.1
2021-03-10 CVE-2020-23722 Authorization Bypass Through User-Controlled Key vulnerability in Thedaylightstudio Fuel CMS 1.4.7
An issue was discovered in FUEL CMS 1.4.7.
network
low complexity
thedaylightstudio CWE-639
8.8
2021-03-02 CVE-2021-21255 Authorization Bypass Through User-Controlled Key vulnerability in Glpi-Project Glpi 9.5.3
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing.
network
low complexity
glpi-project CWE-639
5.7