Search Results (1524 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-28320 2 Hospital Management System Project, Mayurik 2 Hospital Management System, Hospital Management System 2025-04-01 7.6 High
Insecure Direct Object References (IDOR) vulnerability in Hospital Management System 1.0 allows attackers to manipulate user parameters for unauthorized access and modifications via crafted POST request to /patient/edit-user.php.
CVE-2021-36874 1 Stylemixthemes 1 Ulisting 2025-03-28 7.1 High
Authenticated Insecure Direct Object References (IDOR) vulnerability in WordPress uListing plugin (versions <= 2.0.5).
CVE-2024-4886 1 Buddyboss 1 Buddyboss Platform 2025-03-27 4.3 Medium
The contains an IDOR vulnerability that allows a user to comment on a private post by manipulating the ID included in the request
CVE-2024-55231 1 Phpgurukul 1 Online Notes Sharing Management System 2025-03-27 4.3 Medium
An IDOR vulnerability in the edit-notes.php module of PHPGurukul Online Notes Sharing Management System v1.0 allows unauthorized users to modify notes belonging to other accounts due to missing authorization checks. This flaw exposes sensitive data and enables attackers to alter another user's information.
CVE-2022-34138 1 Biltema 4 Baby Camera, Baby Camera Firmware, Ip Camera and 1 more 2025-03-26 7.5 High
Insecure direct object references (IDOR) in the web server of Biltema IP and Baby Camera Software v124 allows attackers to access sensitive information.
CVE-2024-40395 1 Ptc 1 Thingworx 2025-03-25 6.5 Medium
An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5.0 allows attackers to view sensitive information, including PII, regardless of access level.
CVE-2024-25270 1 Mirapolis 1 Lms 2025-03-25 4.3 Medium
An issue in Mirapolis LMS 4.6.XX allows authenticated users to exploit an Insecure Direct Object Reference (IDOR) vulnerability by manipulating the ID parameter and increment STEP parameter, leading to the exposure of sensitive user data.
CVE-2025-2125 1 Assaabloy 1 Control Id Rhid 2025-03-24 4.3 Medium
A vulnerability has been found in Control iD RH iD 25.2.25.0 and classified as problematic. This vulnerability affects unknown code of the file /v2/report.svc/comprovante_marcacao/?companyId=1 of the component PDF Document Handler. The manipulation of the argument nsr leads to improper control of resource identifiers. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-31296 1 Reputeinfosystems 1 Bookingpress 2025-03-20 4.3 Medium
Authorization Bypass Through User-Controlled Key vulnerability in Repute Infosystems BookingPress.This issue affects BookingPress: from n/a through 1.0.81.
CVE-2024-47047 1 In2code 1 Powermail 2025-03-17 7.5 High
An issue was discovered in the powermail extension through 12.4.0 for TYPO3. It fails to validate the mail parameter of the createAction, resulting in Insecure Direct Object Reference (IDOR) in some configurations. An unauthenticated attacker can use this to display user-submitted data of all forms persisted by the extension. The fixed versions are 7.5.1, 8.5.1, 10.9.1, and 12.4.1.
CVE-2023-0882 2 Krontech, Microsoft 2 Single Connect, Windows 2025-03-12 8.8 High
Improper Input Validation, Authorization Bypass Through User-Controlled Key vulnerability in Kron Tech Single Connect on Windows allows Privilege Abuse. This issue affects Single Connect: 2.16.
CVE-2024-27113 1 Soplanning 1 Soplanning 2025-03-11 9.8 Critical
An unauthenticated Insecure Direct Object Reference (IDOR) to the database has been found in the SO Planning tool that occurs when the public view setting is enabled. An attacker could use this vulnerability to gain access to the underlying database by exporting it as a CSV file. The vulnerability has been remediated in version 1.52.02.
CVE-2023-22471 1 Nextcloud 1 Deck 2025-03-10 3.5 Low
Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. Broken access control allows a user to delete attachments of other users. There are currently no known workarounds. It is recommended that the Nextcloud Deck app is upgraded to 1.6.5 or 1.7.3 or 1.8.2.
CVE-2023-25160 1 Nextcloud 1 Mail 2025-03-10 4.1 Medium
Nextcloud Mail is an email app for the Nextcloud home server platform. Prior to versions 2.2.1, 1.14.5, 1.12.9, and 1.11.8, an attacker can access the mail box by ID getting the subjects and the first characters of the emails. Users should upgrade to Mail 2.2.1 for Nextcloud 25, Mail 1.14.5 for Nextcloud 22-24, Mail 1.12.9 for Nextcloud 21, or Mail 1.11.8 for Nextcloud 20 to receive a patch. No known workarounds are available.
CVE-2021-36400 1 Moodle 1 Moodle 2025-03-07 5.3 Medium
In Moodle, insufficient capability checks made it possible to remove other users' calendar URL subscriptions.
CVE-2023-25403 1 Yf-exam Project 1 Yf-exam 2025-03-07 7.5 High
CleverStupidDog yf-exam v 1.8.0 is vulnerable to Authentication Bypass. The program uses a fixed JWT key, and the stored key uses username format characters. Any user who logged in within 24 hours. A token can be forged with his username to bypass authentication.
CVE-2023-1462 1 Vadi 1 Digikent 2025-02-26 8.8 High
Authorization Bypass Through User-Controlled Key vulnerability in Vadi Corporate Information Systems DigiKent allows Authentication Bypass, Authentication Abuse. This issue affects DigiKent: before 23.03.20.
CVE-2023-0865 1 Woocommerce Multiple Customer Addresses \& Shipping Project 1 Woocommerce Multiple Customer Addresses \& Shipping 2025-02-26 8.8 High
The WooCommerce Multiple Customer Addresses & Shipping WordPress plugin before 21.7 does not ensure that the address to add/update/retrieve/delete and duplicate belong to the user making the request, or is from a high privilege users, allowing any authenticated users, such as subscriber to add/update/duplicate/delete as well as retrieve addresses of other users.
CVE-2023-1463 1 Teampass 1 Teampass 2025-02-26 5.4 Medium
Authorization Bypass Through User-Controlled Key in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.
CVE-2023-28109 1 Play-with-docker 1 Play With Docker 2025-02-25 6.5 Medium
Play With Docker is a browser-based Docker playground. Versions 0.0.2 and prior are vulnerable to domain hijacking. Because CORS configuration was not correct, an attacker could use `play-with-docker.com` as an example and set the origin header in an http request as `evil-play-with-docker.com`. The domain would echo in response header, which successfully bypassed the CORS policy and retrieved basic user information. This issue has been fixed in commit ed82247c9ab7990ad76ec2bf1498c2b2830b6f1a. There are no known workarounds.