Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2019-07-10 CVE-2018-19575 Authorization Bypass Through User-Controlled Key vulnerability in Gitlab
GitLab CE/EE, versions 10.1 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an insecure direct object reference issue that allows a user to make comments on a locked issue.
network
low complexity
gitlab CWE-639
4.0
2019-07-09 CVE-2019-13337 Authorization Bypass Through User-Controlled Key vulnerability in Weseek Growi
In WESEEK GROWI before 3.5.0, the site-wide basic authentication can be bypassed by adding a URL parameter access_token (this is the parameter used by the API).
network
low complexity
weseek CWE-639
5.0
2019-07-09 CVE-2019-13461 Authorization Bypass Through User-Controlled Key vulnerability in Prestashop
In PrestaShop before 1.7.6.0 RC2, the id_address_delivery and id_address_invoice parameters are affected by an Insecure Direct Object Reference vulnerability due to a guessable value sent to the web application during checkout.
network
low complexity
prestashop CWE-639
5.0
2019-07-09 CVE-2019-12782 Authorization Bypass Through User-Controlled Key vulnerability in Thoughtspot 4.4.1/4.5.1/5.1.1
An authorization bypass vulnerability in pinboard updates in ThoughtSpot 4.4.1 through 5.1.1 (before 5.1.2) allows a low-privilege user with write access to at least one pinboard to corrupt pinboards of another user in the application by spoofing GUIDs in pinboard update requests, effectively deleting them.
network
low complexity
thoughtspot CWE-639
5.5
2019-07-05 CVE-2019-5966 Authorization Bypass Through User-Controlled Key vulnerability in Joruri Mail 2.1.4
Joruri Mail 2.1.4 and earlier does not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and alter/disclose the information via unspecified vectors.
network
joruri CWE-639
5.8
2019-07-03 CVE-2019-12866 Authorization Bypass Through User-Controlled Key vulnerability in Jetbrains Youtrack
An Insecure Direct Object Reference, with Authorization Bypass through a User-Controlled Key, was possible in JetBrains YouTrack.
network
low complexity
jetbrains CWE-639
7.5
2019-06-05 CVE-2019-12742 Authorization Bypass Through User-Controlled Key vulnerability in Bludit
Bludit prior to 3.9.1 allows a non-privileged user to change the password of any account, including admin.
network
low complexity
bludit CWE-639
6.5
2019-05-21 CVE-2019-12252 Authorization Bypass Through User-Controlled Key vulnerability in Zohocorp Manageengine Servicedesk Plus
In Zoho ManageEngine ServiceDesk Plus through 10.5, users with the lowest privileges (guest) can view an arbitrary post by appending its number to the SDNotify.do?notifyModule=Solution&mode=E-Mail&notifyTo=SOLFORWARD&id= substring.
network
low complexity
zohocorp CWE-639
6.5
2019-05-15 CVE-2019-10108 Authorization Bypass Through User-Controlled Key vulnerability in Gitlab
An Incorrect Access Control (issue 1 of 2) was discovered in GitLab Community and Enterprise Edition before 11.7.8, 11.8.x before 11.8.4, and 11.9.x before 11.9.2.
network
low complexity
gitlab CWE-639
5.5
2019-05-06 CVE-2018-18976 Authorization Bypass Through User-Controlled Key vulnerability in Ascensia Contour Diabetes
An issue was discovered in the Ascensia Contour NEXT ONE application for iOS and Android before 2019-01-15.
network
low complexity
ascensia CWE-639
5.0