Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2021-06-02 CVE-2020-6641 Authorization Bypass Through User-Controlled Key vulnerability in Fortinet Fortipresence
Two authorization bypass through user-controlled key vulnerabilities in the Fortinet FortiPresence 2.1.0 administration interface may allow an attacker to gain access to some user data via portal manager or portal users parameters.
network
low complexity
fortinet CWE-639
4.3
2021-06-01 CVE-2021-24318 Authorization Bypass Through User-Controlled Key vulnerability in Purethemes Listeo
The Listeo WordPress theme before 1.6.11 did not ensure that the Post/Page and Booking to delete belong to the user making the request, allowing any authenticated users to delete arbitrary page/post and booking via an IDOR vector.
network
low complexity
purethemes CWE-639
6.5
2021-05-26 CVE-2020-26679 Authorization Bypass Through User-Controlled Key vulnerability in Vfairs 3.3
vFairs 3.3 is affected by Insecure Permissions.
network
low complexity
vfairs CWE-639
4.3
2021-05-07 CVE-2020-36126 Authorization Bypass Through User-Controlled Key vulnerability in Paxtechnology Paxstore 7.0.820200511171508
Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control that can lead to remote privilege escalation.
network
low complexity
paxtechnology CWE-639
8.1
2021-03-10 CVE-2020-23722 Authorization Bypass Through User-Controlled Key vulnerability in Thedaylightstudio Fuel CMS 1.4.7
An issue was discovered in FUEL CMS 1.4.7.
network
low complexity
thedaylightstudio CWE-639
8.8
2021-03-02 CVE-2021-21255 Authorization Bypass Through User-Controlled Key vulnerability in Glpi-Project Glpi 9.5.3
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing.
network
low complexity
glpi-project CWE-639
5.7
2021-02-23 CVE-2020-8297 Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Deck
Nextcloud Deck before 1.0.2 suffers from an insecure direct object reference (IDOR) vulnerability that permits users with a duplicate user identifier to access deck data of a previous deleted user.
network
low complexity
nextcloud CWE-639
4.3
2021-02-09 CVE-2020-13462 Authorization Bypass Through User-Controlled Key vulnerability in Tufin Securetrack 18.1
Insecure Direct Object Reference (IDOR) exists in Tufin SecureChange, affecting all versions prior to R20-2 GA.
low complexity
tufin CWE-639
5.7
2021-02-04 CVE-2020-16194 Authorization Bypass Through User-Controlled Key vulnerability in Store-Opart Quote
An Insecure Direct Object Reference (IDOR) vulnerability was found in Prestashop Opart devis < 4.0.2.
network
low complexity
store-opart CWE-639
5.3
2021-02-03 CVE-2021-26024 Authorization Bypass Through User-Controlled Key vulnerability in Nagios Favorites
The Favorites component before 1.0.2 for Nagios XI 5.8.0 is vulnerable to Insecure Direct Object Reference: it is possible to create favorites for any other user account.
network
low complexity
nagios CWE-639
5.3