Total
541 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-38049 | 2024-07-09 | N/A | 9.9 CRITICAL | ||
A BOLA vulnerability in GET, PUT, DELETE /appointments/{appointmentId} allows a low privileged user to fetch, modify or delete an appointment of any user (including admin). This results in unauthorized access and unauthorized data manipulation. | |||||
CVE-2023-3290 | 2024-07-09 | N/A | 5.0 MEDIUM | ||
A BOLA vulnerability in POST /customers allows a low privileged user to create a low privileged user (customer) in the system. This results in unauthorized data manipulation. | |||||
CVE-2023-38053 | 2024-07-09 | N/A | 9.9 CRITICAL | ||
A BOLA vulnerability in GET, PUT, DELETE /settings/{settingName} allows a low privileged user to fetch, modify or delete the settings of any user (including admin). This results in unauthorized access and unauthorized data manipulation. | |||||
CVE-2024-21759 | 2024-07-09 | N/A | 4.3 MEDIUM | ||
An authorization bypass through user-controlled key in Fortinet FortiPortal version 7.2.0, and versions 7.0.0 through 7.0.6 allows attacker to view unauthorized resources via HTTP or HTTPS requests. | |||||
CVE-2024-5942 | 1 Carlosfazenda | 1 Page And Post Clone | 2024-07-09 | N/A | 5.4 MEDIUM |
The Page and Post Clone plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.0 via the 'content_clone' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to clone and read private posts. | |||||
CVE-2024-39321 | 2024-07-08 | N/A | 7.5 HIGH | ||
Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available. | |||||
CVE-2023-28334 | 1 Moodle | 1 Moodle | 2024-07-08 | N/A | 4.3 MEDIUM |
Authenticated users were able to enumerate other users' names via the learning plans page. | |||||
CVE-2024-33668 | 2024-07-03 | N/A | 9.1 CRITICAL | ||
An issue was discovered in Zammad before 6.3.0. The Zammad Upload Cache uses insecure, partially guessable FormIDs to identify content. An attacker could try to brute force them to upload malicious content to article drafts they have no access to. | |||||
CVE-2024-33383 | 2024-07-03 | N/A | 7.5 HIGH | ||
Arbitrary File Read vulnerability in novel-plus 4.3.0 and before allows a remote attacker to obtain sensitive information via a crafted GET request using the filePath parameter. | |||||
CVE-2024-28320 | 2024-07-03 | N/A | 7.6 HIGH | ||
Insecure Direct Object References (IDOR) vulnerability in Hospital Management System 1.0 allows attackers to manipulate user parameters for unauthorized access and modifications via crafted POST request to /patient/edit-user.php. | |||||
CVE-2024-24312 | 2024-07-03 | N/A | 7.5 HIGH | ||
SQL injection vulnerability in Vaales Technologies V_QRS v.2024-01-17 allows a remote attacker to obtain sensitive information via the Models/UserModel.php component. | |||||
CVE-2023-49112 | 2024-07-03 | N/A | 6.5 MEDIUM | ||
Kiuwan provides an API endpoint /saas/rest/v1/info/application to get information about any application, providing only its name via the "application" parameter. This endpoint lacks proper access control mechanisms, allowing other authenticated users to read information about applications, even though they have not been granted the necessary rights to do so. This issue affects Kiuwan SAST: <master.1808.p685.q13371 | |||||
CVE-2021-36387 | 1 Yellowfinbi | 1 Yellowfin | 2024-07-03 | 3.5 LOW | 5.4 MEDIUM |
In Yellowfin before 9.6.1 there is a Stored Cross-Site Scripting vulnerability in the video embed functionality exploitable through a specially crafted HTTP POST request to the page "ActivityStreamAjax.i4". | |||||
CVE-2021-31970 | 1 Microsoft | 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more | 2024-07-03 | 2.1 LOW | 5.5 MEDIUM |
Windows TCP/IP Driver Security Feature Bypass Vulnerability | |||||
CVE-2024-31898 | 2024-07-01 | N/A | 5.4 MEDIUM | ||
IBM InfoSphere Information Server 11.7 could allow an authenticated user to read or modify sensitive information by bypassing authentication using insecure direct object references. IBM X-Force ID: 288182. | |||||
CVE-2024-1107 | 2024-06-27 | N/A | 8.8 HIGH | ||
Authorization Bypass Through User-Controlled Key vulnerability in Talya Informatics Travel APPS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Travel APPS: before v17.0.68. | |||||
CVE-2024-4874 | 1 Bricksbuilder | 1 Bricks | 2024-06-24 | N/A | 4.3 MEDIUM |
The Bricks Builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.8 via the postId parameter due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify posts and pages created by other users including admins. As a requirement for this, an admin would have to enable access to the editor specifically for such a user or enable it for all users with a certain user account type. | |||||
CVE-2024-5639 | 1 Cozmoslabs | 1 User Profile Picture | 2024-06-24 | N/A | 4.3 MEDIUM |
The User Profile Picture plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.6.1 via the 'rest_api_change_profile_image' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to update the profile picture of any user. | |||||
CVE-2024-2576 | 2024-06-21 | 7.5 HIGH | 7.3 HIGH | ||
A vulnerability, which was classified as critical, was found in SourceCodester Employee Task Management System 1.0. This affects an unknown part of the file /update-admin.php. The manipulation of the argument admin_id leads to authorization bypass. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257079. | |||||
CVE-2023-44981 | 2 Apache, Debian | 2 Zookeeper, Debian Linux | 2024-06-21 | N/A | 9.1 CRITICAL |
Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authentication ID is listed in zoo.cfg server list. The instance part in SASL auth ID is optional and if it's missing, like 'eve@EXAMPLE.COM', the authorization check will be skipped. As a result an arbitrary endpoint could join the cluster and begin propagating counterfeit changes to the leader, essentially giving it complete read-write access to the data tree. Quorum Peer authentication is not enabled by default. Users are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which fixes the issue. Alternately ensure the ensemble election/quorum communication is protected by a firewall as this will mitigate the issue. See the documentation for more details on correct cluster administration. |