Vulnerabilities > Authorization Bypass Through User-Controlled Key
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-10-05 | CVE-2021-39889 | Authorization Bypass Through User-Controlled Key vulnerability in Gitlab In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch name to a malicious user who makes a crafted API call with the ID of the protected branch. | 4.3 |
2021-10-04 | CVE-2021-37331 | Authorization Bypass Through User-Controlled Key vulnerability in Bookingcore Booking Core 2.0 Laravel Booking System Booking Core 2.0 is vulnerable to Incorrect Access Control. | 5.3 |
2021-10-04 | CVE-2021-37777 | Authorization Bypass Through User-Controlled Key vulnerability in Gilacms Gila CMS 2.2.0 Gila CMS 2.2.0 is vulnerable to Insecure Direct Object Reference (IDOR). | 7.5 |
2021-10-01 | CVE-2021-41847 | Authorization Bypass Through User-Controlled Key vulnerability in 3Xlogic Infinias Access Control 6.7.10708.0 An issue was discovered in 3xLogic Infinias Access Control through 6.7.10708.0, affecting physical security. | 8.8 |
2021-09-27 | CVE-2021-36874 | Authorization Bypass Through User-Controlled Key vulnerability in Stylemixthemes Ulisting Authenticated Insecure Direct Object References (IDOR) vulnerability in WordPress uListing plugin (versions <= 2.0.5). | 8.8 |
2021-09-15 | CVE-2021-29773 | Authorization Bypass Through User-Controlled Key vulnerability in IBM Security Guardium 10.6/11.3 IBM Security Guardium 10.6 and 11.3 could allow a remote authenticated attacker to obtain sensitive information or modify user details caused by an insecure direct object vulnerability (IDOR). | 5.4 |
2021-09-08 | CVE-2021-33981 | Authorization Bypass Through User-Controlled Key vulnerability in Myfwc Fish | Hunt FL An insecure, direct object vulnerability in hunting/fishing license retrieval function of the "Fish | Hunt FL" iOS app versions 3.8.0 and earlier allows a remote authenticated attacker to retrieve other people's personal information and images of their hunting/fishing licenses. | 4.3 |
2021-09-07 | CVE-2021-37628 | Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Richdocuments Nextcloud Richdocuments is an open source collaborative office suite. | 7.5 |
2021-09-07 | CVE-2021-37630 | Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Circles Nextcloud Circles is an open source social network built for the nextcloud ecosystem. | 6.5 |
2021-09-07 | CVE-2021-37631 | Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Deck Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. | 6.5 |