Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2021-11-10 CVE-2021-3380 Authorization Bypass Through User-Controlled Key vulnerability in Height8Tech H8 Ssrms
Insecure direct object reference (IDOR) vulnerability in ICREM H8 SSRMS allows attackers to disclose sensitive information via the Print Invoice Functionality.
network
low complexity
height8tech CWE-639
6.5
2021-11-08 CVE-2021-24840 Authorization Bypass Through User-Controlled Key vulnerability in Codesupply Squaretype
The Squaretype WordPress theme before 3.0.4 allows unauthenticated users to manipulate the query_vars used to retrieve the posts to display in one of its REST endpoint, without any validation.
network
low complexity
codesupply CWE-639
5.3
2021-10-26 CVE-2021-41305 Authorization Bypass Through User-Controlled Key vulnerability in Atlassian Jira
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view the names of private projects and filters via an Insecure Direct Object References (IDOR) vulnerability in the Average Number of Times in Status Gadget.
network
low complexity
atlassian CWE-639
7.5
2021-10-26 CVE-2021-41306 Authorization Bypass Through User-Controlled Key vulnerability in Atlassian Jira
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view private project and filter names via an Insecure Direct Object References (IDOR) vulnerability in the Average Time in Status Gadget.
network
low complexity
atlassian CWE-639
7.5
2021-10-26 CVE-2021-41307 Authorization Bypass Through User-Controlled Key vulnerability in Atlassian Jira
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to view the names of private projects and private filters via an Insecure Direct Object References (IDOR) vulnerability in the Workload Pie Chart Gadget.
network
low complexity
atlassian CWE-639
7.5
2021-10-14 CVE-2021-36388 Authorization Bypass Through User-Controlled Key vulnerability in Yellowfinbi Yellowfin
In Yellowfin before 9.6.1 it is possible to enumerate and download users profile pictures through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIIAvatarImage.i4".
network
low complexity
yellowfinbi CWE-639
7.5
2021-10-14 CVE-2021-36389 Authorization Bypass Through User-Controlled Key vulnerability in Yellowfinbi Yellowfin
In Yellowfin before 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4".
network
low complexity
yellowfinbi CWE-639
7.5
2021-10-05 CVE-2021-41120 Authorization Bypass Through User-Controlled Key vulnerability in Sylius Paypal
sylius/paypal-plugin is a paypal plugin for the Sylius development platform.
network
low complexity
sylius CWE-639
7.5
2021-10-05 CVE-2021-39889 Authorization Bypass Through User-Controlled Key vulnerability in Gitlab
In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch name to a malicious user who makes a crafted API call with the ID of the protected branch.
network
low complexity
gitlab CWE-639
4.3
2021-10-04 CVE-2021-37331 Authorization Bypass Through User-Controlled Key vulnerability in Bookingcore Booking Core 2.0
Laravel Booking System Booking Core 2.0 is vulnerable to Incorrect Access Control.
network
low complexity
bookingcore CWE-639
5.3