Total
653 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-36874 | 1 Stylemixthemes | 1 Ulisting | 2024-09-16 | 7.1 High |
Authenticated Insecure Direct Object References (IDOR) vulnerability in WordPress uListing plugin (versions <= 2.0.5). | ||||
CVE-2021-44160 | 1 Cth | 1 Carinal Tien Hospital Health Report System | 2024-09-16 | 7.3 High |
Carinal Tien Hospital Health Report System’s login page has improper authentication, a remote attacker can acquire another general user’s privilege by modifying the cookie parameter without authentication. The attacker can then perform limited operations on the system or modify data, making the service partially unavailable to the user. | ||||
CVE-2022-34150 | 1 Micodus | 2 Mv720, Mv720 Firmware | 2024-09-16 | 7.1 High |
The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object reference vulnerability on endpoint and parameter device IDs, which accept arbitrary device IDs without further verification. | ||||
CVE-2022-22190 | 1 Juniper | 1 Paragon Active Assurance Control Center | 2024-09-16 | 7.4 High |
An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potentially containing sensitive configuration information. A feature was introduced in version 3.1 of the Paragon Active Assurance Control Center which allows users to selective share account data using a unique identifier. Knowing the proper format of the URL and the identifier of an existing object in an application it is possible to get access to that object without being logged in, even if the object is not shared, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance version 3.1.0. | ||||
CVE-2017-15208 | 1 Kanboard | 1 Kanboard | 2024-09-16 | N/A |
In Kanboard before 1.0.47, by altering form data, an authenticated user can remove automatic actions from a private project of another user. | ||||
CVE-2017-0936 | 1 Nextcloud | 1 Nextcloud Server | 2024-09-16 | N/A |
Nextcloud Server before 11.0.7 and 12.0.5 suffers from an Authorization Bypass Through User-Controlled Key vulnerability. A missing ownership check allowed logged-in users to change the scope of app passwords of other users. Note that the app passwords themselves where neither disclosed nor could the error be misused to identify as another user. | ||||
CVE-2017-15202 | 1 Kanboard | 1 Kanboard | 2024-09-16 | N/A |
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit columns of a private project of another user. | ||||
CVE-2017-15209 | 1 Kanboard | 1 Kanboard | 2024-09-16 | N/A |
In Kanboard before 1.0.47, by altering form data, an authenticated user can remove attachments from a private project of another user. | ||||
CVE-2017-15195 | 1 Kanboard | 1 Kanboard | 2024-09-16 | N/A |
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit swimlanes of a private project of another user. | ||||
CVE-2020-14174 | 1 Atlassian | 4 Jira, Jira Data Center, Jira Server and 1 more | 2024-09-16 | 4.3 Medium |
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to view titles of a private project via an Insecure Direct Object References (IDOR) vulnerability in the Administration Permission Helper. The affected versions are before version 7.13.6, from version 8.0.0 before 8.5.7, from version 8.6.0 before 8.9.2, and from version 8.10.0 before 8.10.1. | ||||
CVE-2017-15200 | 1 Kanboard | 1 Kanboard | 2024-09-16 | N/A |
In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new task to a private project of another user. | ||||
CVE-2022-43492 | 1 Gvectors | 1 Wpdiscuz | 2024-09-16 | 4.3 Medium |
Auth. (subscriber+) Insecure Direct Object References (IDOR) vulnerability in Comments – wpDiscuz plugin 7.4.2 on WordPress. | ||||
CVE-2021-41298 | 1 Ecoa | 5 Ecs Router Controller-ecs, Ecs Router Controller-ecs Firmware, Riskbuster and 2 more | 2024-09-16 | 8.8 High |
ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely bypass authorization and access the hidden resources in the system and execute privileged functionalities. | ||||
CVE-2022-2808 | 1 Algan | 1 Prens Student Information System | 2024-09-16 | 8.8 High |
Authorization Bypass Through User-Controlled Key vulnerability in Algan Software Prens Student Information System allows Object Relational Mapping Injection.This issue affects Prens Student Information System: before 2.1.11. | ||||
CVE-2021-36329 | 1 Dell | 1 Emc Streaming Data Platform | 2024-09-16 | 6.5 Medium |
Dell EMC Streaming Data Platform versions before 1.3 contain an Indirect Object Reference Vulnerability. A remote malicious user may potentially exploit this vulnerability to gain sensitive information. | ||||
CVE-2018-1000210 | 1 Yamldotnet Project | 1 Yamldotnet | 2024-09-16 | N/A |
YamlDotNet version 4.3.2 and earlier contains a Insecure Direct Object Reference vulnerability in The default behavior of Deserializer.Deserialize() will deserialize user-controlled types in the line "currentType = Type.GetType(nodeEvent.Tag.Substring(1), throwOnError: false);" and blindly instantiates them. that can result in Code execution in the context of the running process. This attack appear to be exploitable via Victim must parse a specially-crafted YAML file. This vulnerability appears to have been fixed in 5.0.0. | ||||
CVE-2022-36966 | 1 Solarwinds | 1 Orion Platform | 2024-09-16 | 5.4 Medium |
Users with Node Management rights were able to view and edit all nodes due to Insufficient control on URL parameter causing insecure direct object reference (IDOR) vulnerability in SolarWinds Platform 2022.3 and previous. | ||||
CVE-2022-23173 | 1 Priority-software | 1 Priority | 2024-09-16 | 5.5 Medium |
this vulnerability affect user that even not allowed to access via the web interface. First of all, the attacker needs to access the "Login menu - demo site" then he can see in this menu all the functionality of the application. If the attacker will try to click on one of the links, he will get an answer that he is not authorized because he needs to log in with credentials. after he performed log in to the system there are some functionalities that the specific user is not allowed to perform because he was configured with low privileges however all the attacker need to do in order to achieve his goals is to change the value of the prog step parameter from 0 to 1 or more and then the attacker could access to some of the functionality the web application that he couldn't perform it before the parameter changed. | ||||
CVE-2017-15203 | 1 Kanboard | 1 Kanboard | 2024-09-16 | N/A |
In Kanboard before 1.0.47, by altering form data, an authenticated user can remove categories from a private project of another user. | ||||
CVE-2017-15199 | 1 Kanboard | 1 Kanboard | 2024-09-16 | N/A |
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit metadata of a private project of another user, as demonstrated by Name, Email, Identifier, and Description. |