An issue was discovered on various devices via the Linkplay firmware. There is WAN remote code execution without user interaction. An attacker could retrieve the AWS key from the firmware and obtain full control over Linkplay's AWS estate, including S3 buckets containing device firmware. When combined with an OS command injection vulnerability within the XML Parsing logic of the firmware update process, an attacker would be able to gain code execution on any device that attempted to update. Note that by default all devices tested had automatic updates enabled.
Max CVSS
10.0
EPSS Score
6.47%
Published
2020-07-01
Updated
2021-07-21
ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.
Max CVSS
10.0
EPSS Score
0.19%
Published
2021-09-30
Updated
2021-10-07
Authorization Bypass Through User-Controlled Key in GitHub repository publify/publify prior to 9.2.9.
Max CVSS
9.9
EPSS Score
0.05%
Published
2022-05-23
Updated
2023-06-29
An issue was discovered in GitLab Community and Enterprise Edition 10.x (starting from 10.8) and 11.x before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Incorrect Access Control, a different vulnerability than CVE-2019-9732.
Max CVSS
9.8
EPSS Score
0.78%
Published
2019-04-17
Updated
2020-08-24
An Insecure Direct Object Reference, with Authorization Bypass through a User-Controlled Key, was possible in JetBrains YouTrack. The issue was fixed in 2018.4.49168.
Max CVSS
9.8
EPSS Score
0.31%
Published
2019-07-03
Updated
2020-08-24
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.836, remote attackers can bypass authentication in the login process by leveraging knowledge of a valid username.
Max CVSS
9.8
EPSS Score
3.03%
Published
2019-07-16
Updated
2023-01-24
An issue was discovered on Xiaomi DGNWG03LM, ZNCZ03LM, MCCGQ01LM, WSDCGQ01LM, RTCGQ01LM devices. Because of insecure key transport in ZigBee communication, causing attackers to gain sensitive information and denial of service attack, take over smart home devices, and tamper with messages.
Max CVSS
9.8
EPSS Score
0.47%
Published
2019-12-20
Updated
2020-01-03
CA API Developer Portal 4.3.1 and earlier handles shared secret keys in an insecure manner, which allows attackers to bypass authorization.
Max CVSS
9.8
EPSS Score
0.37%
Published
2020-04-15
Updated
2020-04-20
RSFirewall tries to identify the original IP address by looking at different HTTP headers. A bypass is possible due to the way it is implemented.
Max CVSS
9.8
EPSS Score
0.23%
Published
2022-12-15
Updated
2022-12-20
Collabora Online is a collaborative online office suite. In versions prior to 4.2.17-1 and version 6.4.9-5, unauthenticated attackers are able to gain access to files which are currently opened by other users in the Collabora Online editor. For successful exploitation the attacker is required to guess the file identifier - the predictability of this file identifier is dependent on external file-storage implementations (this is a potential "IDOR" - Insecure Direct Object Reference - vulnerability). Versions 4.2.17-1 and 6.4.9-5 contain patches for this issue. There is no known workaround except updating the Collabora Online application to one of the patched releases.
Max CVSS
9.8
EPSS Score
0.17%
Published
2021-07-21
Updated
2021-07-30
A vulnerability has been identified in Industrial Edge Management (All versions < V1.3). An unauthenticated attacker could change the the password of any user in the system under certain circumstances. With this an attacker could impersonate any valid user on an affected system.
Max CVSS
9.8
EPSS Score
0.15%
Published
2021-09-14
Updated
2021-09-24
TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.
Max CVSS
9.8
EPSS Score
7.91%
Published
2022-01-03
Updated
2022-05-12
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.
Max CVSS
9.8
EPSS Score
0.24%
Published
2022-02-21
Updated
2023-02-23
A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
Max CVSS
9.8
EPSS Score
0.24%
Published
2022-07-08
Updated
2023-06-27
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.0.
Max CVSS
9.8
EPSS Score
0.16%
Published
2022-12-23
Updated
2023-06-27
In oretnom23 Automotive Shop Management System v1.0, the name id parameter is vulnerable to IDOR - Broken Access Control allowing attackers to change the admin password(vertical privilege escalation)
Max CVSS
9.8
EPSS Score
0.30%
Published
2022-05-26
Updated
2022-06-10
The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to an unsecure token check that is susceptible to type juggling in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to execute functions intended for use by users with proper API keys.
Max CVSS
9.8
EPSS Score
0.24%
Published
2023-01-27
Updated
2024-01-09
The WCFM Membership – WooCommerce Memberships for Multivendor Marketplace plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 2.10.7. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts.
Max CVSS
9.8
EPSS Score
0.08%
Published
2023-05-20
Updated
2023-06-13
Authorization Bypass Through User-Controlled Key vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform allows Authentication Abuse, Authentication Bypass.This issue affects Rental Module: before 23.05.15.
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-05-20
Updated
2023-08-02
Authorization Bypass Through User-Controlled Key vulnerability in Origin Software ATS Pro allows Authentication Abuse, Authentication Bypass.This issue affects ATS Pro: before 20230714.
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-07-17
Updated
2023-07-31
Authorization Bypass Through User-Controlled Key vulnerability in TMT Lockcell allows Authentication Abuse, Authentication Bypass.This issue affects Lockcell: before 15.
Max CVSS
9.8
EPSS Score
0.11%
Published
2023-06-13
Updated
2023-08-02
EuroTel ETL3100 versions v01c01 and v01x37 are vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers can bypass authorization, access the hidden resources on the system, and execute privileged functionalities.
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-12-19
Updated
2023-12-29
EasyTor Applications – Authorization Bypass - EasyTor Applications may allow authorization bypass via unspecified method.
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-05-08
Updated
2023-05-15
Vulnerability of commands from the modem being intercepted in the atcmdserver module. Attackers may exploit this vulnerability to rewrite the non-volatile random-access memory (NVRAM), or facilitate the exploitation of other vulnerabilities.
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-07-06
Updated
2023-07-12

CVE-2023-38965

Public exploit
Lost and Found Information System 1.0 allows account takeover via username and password to a /classes/Users.php?f=save URI.
Max CVSS
9.8
EPSS Score
0.30%
Published
2023-11-03
Updated
2023-11-13
528 vulnerabilities found
1 2 3 4 5 6 ...... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!