Total
655 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-43350 | 1 Propovoice | 1 Propovoice Crm | 2024-09-03 | 5.3 Medium |
Authorization Bypass Through User-Controlled Key vulnerability in Propovoice Propovoice CRM.This issue affects Propovoice CRM: from n/a through 1.7.6.4. | ||||
CVE-2024-43322 | 2024-09-03 | 5.4 Medium | ||
Authorization Bypass Through User-Controlled Key vulnerability in Dylan James Zephyr Project Manager.This issue affects Zephyr Project Manager: from n/a through 3.3.100. | ||||
CVE-2024-45232 | 2 In2code, Typo3 | 2 Powermail, Typo3 | 2024-08-30 | 7.3 High |
An issue was discovered in powermail extension through 12.3.5 for TYPO3. It fails to validate the mail parameter of the confirmationAction, resulting in Insecure Direct Object Reference (IDOR). An unauthenticated attacker can use this to display the user-submitted data of all forms persisted by the extension. This can only be exploited when the extension is configured to save submitted form data to the database (plugin.tx_powermail.settings.db.enable=1), which however is the default setting of the extension. The fixed versions are 7.5.0, 8.5.0, 10.9.0, and 12.4.0 | ||||
CVE-2024-40395 | 1 Ptc | 1 Thingworx | 2024-08-30 | 6.5 Medium |
An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5.0 allows attackers to view sensitive information, including PII, regardless of access level. | ||||
CVE-2024-33818 | 2024-08-29 | N/A | ||
Globitel KSA SpeechLog v8.1 was discovered to contain an Insecure Direct Object Reference (IDOR) via the userID parameter. | ||||
CVE-2024-5258 | 1 Gitlab | 1 Gitlab | 2024-08-29 | 4.4 Medium |
An authorization vulnerability exists within GitLab from versions 16.10 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1 where an authenticated attacker could utilize a crafted naming convention to bypass pipeline authorization logic. | ||||
CVE-2023-7049 | 2024-08-28 | 4.3 Medium | ||
The Custom Field For WP Job Manager plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.2 via the the 'cm_fieldshow' shortcode due to missing validation on the 'job_id' user controlled key. This makes it possible for authenticated attackers, with contributor-level access and above, to expose potentially sensitive post metadata. | ||||
CVE-2024-42463 | 1 Upkeeper | 1 Upkeeper Manager | 2024-08-28 | 6.5 Medium |
Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9. | ||||
CVE-2024-42464 | 1 Upkeeper | 1 Upkeeper Manager | 2024-08-28 | 6.5 Medium |
Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9. | ||||
CVE-2023-36483 | 2024-08-28 | 6.5 Medium | ||
Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android version 1.16.18 and earlier and MASmobile Classic iOS version 1.7.24 and earlier which allows remote attackers to retrieve sensitive data including customer data, security system status, and event history. | ||||
CVE-2023-51503 | 1 Automattic | 1 Woopayments | 2024-08-26 | 5.9 Medium |
Authorization Bypass Through User-Controlled Key vulnerability in Automattic WooPayments – Fully Integrated Solution Built and Supported by Woo.This issue affects WooPayments – Fully Integrated Solution Built and Supported by Woo: from n/a through 6.9.2. | ||||
CVE-2023-51502 | 1 Automattic | 1 Woocommerce Stripe | 2024-08-26 | 7.5 High |
Authorization Bypass Through User-Controlled Key vulnerability in WooCommerce WooCommerce Stripe Payment Gateway.This issue affects WooCommerce Stripe Payment Gateway: from n/a through 7.6.1. | ||||
CVE-2023-3289 | 1 Easyappointments | 1 Easyappointments | 2024-08-26 | 7.7 High |
A BOLA vulnerability in POST /services allows a low privileged user to create a service for any user in the system (including admin). This results in unauthorized data manipulation. | ||||
CVE-2023-3286 | 1 Easyappointments | 1 Easyappointments | 2024-08-26 | 7.7 High |
A BOLA vulnerability in POST /secretaries allows a low privileged user to create a low privileged user (secretary) in the system. This results in unauthorized data manipulation. | ||||
CVE-2023-3288 | 1 Easyappointments | 1 Easyappointments | 2024-08-26 | 8.5 High |
A BOLA vulnerability in POST /providers allows a low privileged user to create a privileged user (provider) in the system. This results in privilege escalation. | ||||
CVE-2023-3290 | 1 Easyappointments | 1 Easyappointments | 2024-08-26 | 5 Medium |
A BOLA vulnerability in POST /customers allows a low privileged user to create a low privileged user (customer) in the system. This results in unauthorized data manipulation. | ||||
CVE-2023-3287 | 1 Easyappointments | 1 Easyappointments | 2024-08-26 | 9.9 Critical |
A BOLA vulnerability in POST /admins allows a low privileged user to create a high privileged user (admin) in the system. This results in privilege escalation. | ||||
CVE-2023-38050 | 1 Easyappointments | 1 Easyappointments | 2024-08-26 | 9.1 Critical |
A BOLA vulnerability in GET, PUT, DELETE /webhooks/{webhookId} allows a low privileged user to fetch, modify or delete a webhook of any user (including admin). This results in unauthorized access and unauthorized data manipulation. | ||||
CVE-2023-38053 | 1 Easyappointments | 1 Easyappointments | 2024-08-26 | 9.9 Critical |
A BOLA vulnerability in GET, PUT, DELETE /settings/{settingName} allows a low privileged user to fetch, modify or delete the settings of any user (including admin). This results in unauthorized access and unauthorized data manipulation. | ||||
CVE-2023-38055 | 1 Easyappointments | 1 Easyappointments | 2024-08-26 | 9.6 Critical |
A BOLA vulnerability in GET, PUT, DELETE /services/{serviceId} allows a low privileged user to fetch, modify or delete the services of any user (including admin). This results in unauthorized access and unauthorized data manipulation. |