Vulnerabilities > Authorization Bypass Through User-Controlled Key

DATE CVE VULNERABILITY TITLE RISK
2020-09-18 CVE-2020-15958 Authorization Bypass Through User-Controlled Key vulnerability in 1Crm 8.5.7/8.6.7
An issue was discovered in 1CRM System through 8.6.7.
network
low complexity
1crm CWE-639
8.6
2020-08-31 CVE-2020-12643 Authorization Bypass Through User-Controlled Key vulnerability in Open-Xchange Appsuite
OX App Suite 7.10.3 and earlier has Incorrect Access Control via an /api/subscriptions request for a snippet containing an email address.
network
low complexity
open-xchange CWE-639
4.3
2020-08-11 CVE-2020-10779 Authorization Bypass Through User-Controlled Key vulnerability in Redhat Cloudforms 4.7/5.0.0
Red Hat CloudForms 4.7 and 5 leads to insecure direct object references (IDOR) and functional level access control bypass due to missing privilege check.
network
low complexity
redhat CWE-639
6.5
2020-07-15 CVE-2020-13923 Authorization Bypass Through User-Controlled Key vulnerability in Apache Ofbiz
IDOR vulnerability in the order processing feature from ecommerce component of Apache OFBiz before 17.12.04
network
low complexity
apache CWE-639
5.3
2020-07-13 CVE-2020-14174 Authorization Bypass Through User-Controlled Key vulnerability in Atlassian products
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to view titles of a private project via an Insecure Direct Object References (IDOR) vulnerability in the Administration Permission Helper.
network
low complexity
atlassian CWE-639
4.3
2020-07-01 CVE-2019-15310 Authorization Bypass Through User-Controlled Key vulnerability in Linkplay
An issue was discovered on various devices via the Linkplay firmware.
network
low complexity
linkplay CWE-639
critical
9.8
2020-06-24 CVE-2020-13700 Authorization Bypass Through User-Controlled Key vulnerability in ACF to Rest API Project ACF to Rest API
An issue was discovered in the acf-to-rest-api plugin through 3.1.0 for WordPress.
network
low complexity
acf-to-rest-api-project CWE-639
7.5
2020-05-12 CVE-2020-8154 Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Server
An Insecure direct object reference vulnerability in Nextcloud Server 18.0.2 allowed an attacker to remote wipe devices of other users when sending a malicious request directly to the endpoint.
network
low complexity
nextcloud CWE-639
7.7
2020-05-07 CVE-2020-5743 Authorization Bypass Through User-Controlled Key vulnerability in Tecnick Tcexam 14.2.2
Improper Control of Resource Identifiers in TCExam 14.2.2 allows a remote, authenticated attacker to access test metadata for which they don't have permission.
network
low complexity
tecnick CWE-639
4.3
2020-05-04 CVE-2020-8791 Authorization Bypass Through User-Controlled Key vulnerability in Oklok Project Oklok 3.1.1
The OKLOK (3.1.1) mobile companion app for Fingerprint Bluetooth Padlock FB50 (2.3) allows remote attackers to submit API requests using authenticated but unauthorized tokens, resulting in IDOR issues.
network
low complexity
oklok-project CWE-639
6.5