Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2021-09-15 CVE-2021-29773 Authorization Bypass Through User-Controlled Key vulnerability in IBM Security Guardium 10.6/11.3
IBM Security Guardium 10.6 and 11.3 could allow a remote authenticated attacker to obtain sensitive information or modify user details caused by an insecure direct object vulnerability (IDOR).
network
low complexity
ibm CWE-639
5.4
2021-09-08 CVE-2021-33981 Authorization Bypass Through User-Controlled Key vulnerability in Myfwc Fish | Hunt FL
An insecure, direct object vulnerability in hunting/fishing license retrieval function of the "Fish | Hunt FL" iOS app versions 3.8.0 and earlier allows a remote authenticated attacker to retrieve other people's personal information and images of their hunting/fishing licenses.
network
low complexity
myfwc CWE-639
4.3
2021-09-07 CVE-2021-37628 Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Richdocuments
Nextcloud Richdocuments is an open source collaborative office suite.
network
low complexity
nextcloud CWE-639
7.5
2021-09-07 CVE-2021-37630 Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Circles
Nextcloud Circles is an open source social network built for the nextcloud ecosystem.
network
low complexity
nextcloud CWE-639
6.5
2021-09-07 CVE-2021-37631 Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Deck
Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud.
network
low complexity
nextcloud CWE-639
6.5
2021-09-01 CVE-2021-36032 Authorization Bypass Through User-Controlled Key vulnerability in Adobe Commerce and Magento Open Source
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability.
network
low complexity
adobe CWE-639
8.8
2021-09-01 CVE-2021-40352 Authorization Bypass Through User-Controlled Key vulnerability in Open-Emr Openemr 6.0.0
OpenEMR 6.0.0 has a pnotes_print.php?noteid= Insecure Direct Object Reference vulnerability via which an attacker can read the messages of all users.
network
low complexity
open-emr CWE-639
6.5
2021-08-30 CVE-2021-22023 Authorization Bypass Through User-Controlled Key vulnerability in VMWare products
The vRealize Operations Manager API (8.x prior to 8.5) has insecure object reference vulnerability.
network
low complexity
vmware CWE-639
7.2
2021-08-23 CVE-2021-24562 Authorization Bypass Through User-Controlled Key vulnerability in Lifterlms
The LMS by LifterLMS – Online Course, Membership & Learning Management System Plugin for WordPress plugin before 4.21.2 was affected by an IDOR issue, allowing students to see other student answers and grades
network
low complexity
lifterlms CWE-639
7.5
2021-08-16 CVE-2021-37709 Authorization Bypass Through User-Controlled Key vulnerability in Shopware
Shopware is an open source eCommerce platform.
network
low complexity
shopware CWE-639
6.5