Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-425:Direct Request ('Forced Browsing')
Weakness ID:425
Version:v4.17
Weakness Name:Direct Request ('Forced Browsing')
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
224Vulnerabilities found

CVE-2024-42001
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.1||MEDIUM
EPSS-0.17% / 37.60%
||
7 Day CHG~0.00%
Published-08 Aug, 2024 | 19:39
Updated-21 Aug, 2024 | 20:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vonets WiFi Bridges Forced Browsing

An improper authentication vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior enables an unauthenticated remote attacker to bypass authentication via a specially crafted direct request when another user has an active session.

Action-Not Available
Vendor-vonetsVonetsvonets
Product-vap11g-500s_firmwarevap11g-500_firmwarevga-1000var1200-hvap11n-300_firmwarevar1200-l_firmwarevbg1200var1200-lvap11g-500svap11ac_firmwarevar600-h_firmwarevap11s-5g_firmwarevga-1000_firmwarevar1200-h_firmwarevap11n-300vap11g-500vap11g-300_firmwarevar11n-300vap11s-5gvap11g-300vap11s_firmwarevap11gvap11acvbg1200_firmwarevap11svap11g_firmwarevar600-hvar11n-300_firmwareVAP11S-5GVAP11N-300VBG1200VAP11GVAR11N-300VGA-1000VAR1200-LVAR1200-HVAP11SVAP11G-300VAP11G-500VAP11G-500SVAP11ACVAR600-Hvap11g-500s_firmwarevap11n-300_firmwarevap11s_firmwarevar1200-l_firmwarevbg1200_firmwarevap11ac_firmwarevar600-h_firmwarevap11s-5g_firmwarevga-1000_firmwarevap11g_firmwarevar1200-h_firmwarevap11g-300_firmwarevar11n-300_firmware
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-33897
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.53% / 67.61%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 00:00
Updated-10 Oct, 2024 | 13:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A compromised HMS Networks Cosy+ device could be used to request a Certificate Signing Request from Talk2m for another device, resulting in an availability issue. The issue was patched on the Talk2m production server on April 18, 2024.

Action-Not Available
Vendor-hms-networksn/ahms-networks
Product-ewon_cosy\+_4g_euewon_cosy\+_firmwareewon_cosy\+_ethernetewon_cosy\+_4g_apacewon_cosy\+_4g_jpewon_cosy\+_4g_naewon_cosy\+_wifin/aewon_cosy_firmware
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-7153
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.14% / 34.29%
||
7 Day CHG~0.00%
Published-27 Jul, 2024 | 22:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Netgear WN604 siteSurvey.php direct request

A vulnerability classified as problematic has been found in Netgear WN604 up to 20240719. Affected is an unknown function of the file siteSurvey.php. The manipulation leads to direct request. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272556. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-NETGEAR, Inc.
Product-WN604wn604_firmware
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-7080
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.66% / 71.44%
||
7 Day CHG~0.00%
Published-24 Jul, 2024 | 20:00
Updated-22 Apr, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Insurance Management System direct request

A vulnerability was found in SourceCodester Insurance Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /E-Insurance/. The manipulation leads to direct request. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272365 was assigned to this vulnerability.

Action-Not Available
Vendor-SourceCodestermunyweki
Product-insurance_management_systemInsurance Management Systeminsurance_management_system
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-39868
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-7.2||HIGH
EPSS-0.39% / 59.91%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 12:05
Updated-27 Aug, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected devices do not properly validate the authentication when performing certain actions in the web interface allowing an unauthenticated attacker to access and edit VxLAN configuration information of networks for which they have no privileges.

Action-Not Available
Vendor-Siemens AG
Product-sinema_remote_connect_serverSINEMA Remote Connect Serversinema_remote_connect_server
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-39867
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-7.2||HIGH
EPSS-0.39% / 59.91%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 12:05
Updated-27 Aug, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected devices do not properly validate the authentication when performing certain actions in the web interface allowing an unauthenticated attacker to access and edit device configuration information of devices for which they have no privileges.

Action-Not Available
Vendor-Siemens AG
Product-sinema_remote_connect_serverSINEMA Remote Connect Server
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-6414
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.06% / 17.69%
||
7 Day CHG~0.00%
Published-30 Jun, 2024 | 03:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Parsec Automation TrakSYS Export Page contentpage direct request

A vulnerability classified as problematic has been found in Parsec Automation TrakSYS 11.x.x. Affected is an unknown function of the file TS/export/contentpage of the component Export Page. The manipulation of the argument ID leads to direct request. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-270000. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Parsec Automationparsec_automation
Product-TrakSYStracksys
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-6188
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-32.32% / 96.90%
||
7 Day CHG~0.00%
Published-20 Jun, 2024 | 13:31
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Parsec Automation TrackSYS pagedefinition direct request

A vulnerability was found in Parsec Automation TrackSYS 11.x.x and classified as problematic. This issue affects some unknown processing of the file /TS/export/pagedefinition. The manipulation of the argument ID leads to direct request. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Parsec Automationparsec_automation
Product-TrackSYStracksys
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-2730
Assigner-Switzerland National Cyber Security Centre (NCSC)
ShareView Details
Assigner-Switzerland National Cyber Security Centre (NCSC)
CVSS Score-5.3||MEDIUM
EPSS-0.32% / 54.80%
||
7 Day CHG~0.00%
Published-10 Apr, 2024 | 13:59
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Predictable Page Indexing Might Lead to Sensitive Data Exposure in Mautic

Mautic uses predictable page indices for unpublished landing pages, their content can be accessed by unauthenticated users under public preview URLs which could expose sensitive data. At the time of publication of the CVE no patch is available

Action-Not Available
Vendor-Mauticmautic
Product-Mauticmautic
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-45598
Assigner-Nozomi Networks Inc.
ShareView Details
Assigner-Nozomi Networks Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.21% / 42.49%
||
7 Day CHG~0.00%
Published-05 Mar, 2024 | 11:33
Updated-10 Apr, 2025 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-425 “Direct Request ('Forced Browsing')” vulnerability in the “measure” functionality of the web application allows a remote unauthenticated attacker to access confidential measure information. This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2.

Action-Not Available
Vendor-ailuxAiLuxailux
Product-imx6imx6 bundleimx6_bundle
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-45596
Assigner-Nozomi Networks Inc.
ShareView Details
Assigner-Nozomi Networks Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.21% / 42.49%
||
7 Day CHG~0.00%
Published-05 Mar, 2024 | 11:31
Updated-17 Oct, 2024 | 10:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-425 “Direct Request ('Forced Browsing')” vulnerability in the “file_configuration” functionality of the web application allows a remote unauthenticated attacker to access confidential configuration files. This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2.

Action-Not Available
Vendor-AiLuxailux
Product-imx6 bundleimx6_bundle
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-0861
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.02% / 6.30%
||
7 Day CHG~0.00%
Published-21 Feb, 2024 | 23:30
Updated-01 May, 2026 | 04:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Direct Request ('Forced Browsing') in GitLab

An issue has been discovered in GitLab EE affecting all versions starting from 16.4 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Users with the `Guest` role can change `Custom dashboard projects` settings contrary to permissions.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-46186
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.31%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 14:29
Updated-08 May, 2025 | 15:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Jazz for Service Management information disclosure

IBM Jazz for Service Management 1.1.3.20 could allow an unauthorized user to obtain sensitive file information using forced browsing due to improper access controls. IBM X-Force ID: 269929.

Action-Not Available
Vendor-IBM Corporation
Product-jazz_for_service_managementJazz for Service Management
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-24592
Assigner-HiddenLayer, Inc.
ShareView Details
Assigner-HiddenLayer, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.89% / 75.69%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 14:41
Updated-22 Aug, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lack of authentication in all versions of the fileserver component of Allegro AI’s ClearML platform allows a remote attacker to arbitrarily access, create, modify and delete files.

Action-Not Available
Vendor-clearAllegro.AIallegro_ai
Product-clearmlClearMLclearml
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CWE ID-CWE-287
Improper Authentication
CVE-2023-50935
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 13.26%
||
7 Day CHG~0.00%
Published-02 Feb, 2024 | 01:12
Updated-02 Aug, 2024 | 22:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM PowerSC forced browsing

IBM PowerSC 1.3, 2.0, and 2.1 fails to properly restrict access to a URL or resource, which may allow a remote attacker to obtain unauthorized access to application functionality and/or resources. IBM X-Force ID: 275115.

Action-Not Available
Vendor-IBM Corporation
Product-powerscPowerSCpowersc
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-0456
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.15% / 35.72%
||
7 Day CHG~0.00%
Published-26 Jan, 2024 | 01:02
Updated-19 May, 2026 | 23:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Direct Request ('Forced Browsing') in GitLab

An authorization vulnerability exists in GitLab versions 14.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. An unauthorized attacker is able to assign arbitrary users to MRs that they created within the project

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-0204
Assigner-Fortra, LLC
ShareView Details
Assigner-Fortra, LLC
CVSS Score-9.8||CRITICAL
EPSS-93.05% / 99.79%
||
7 Day CHG~0.00%
Published-22 Jan, 2024 | 18:05
Updated-30 May, 2025 | 14:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass in GoAnywhere MFT

Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.

Action-Not Available
Vendor-Fortra LLC
Product-goanywhere_managed_file_transferGoAnywhere MFT
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-44320
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-4.3||MEDIUM
EPSS-0.14% / 33.16%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 11:03
Updated-25 Feb, 2026 | 16:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.2.2), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices do not properly validate the authentication when performing certain modifications in the web interface allowing an authenticated attacker to influence the user interface configured by an administrator.

Action-Not Available
Vendor-Siemens AG
Product-6gk5213-3bd00-2ab26gk5213-3bf00-2ab2_firmware6gk5208-0ga00-2fc2_firmware6gk5208-0ua00-5es66gk5208-0ba00-2ac2_firmware6gk5205-3bf00-2tb2_firmware6gk5328-4ss00-2ar3_firmware6gk5216-4gs00-2ac26gk5224-4gs00-2tc26gk5205-3bb00-2tb2_firmware6gk5326-2qs00-3ar3_firmware6gk5216-4gs00-2fc2_firmware6gk5328-4fs00-3ar3_firmware6gk5328-4fs00-3rr36gk5216-0ba00-2ab26gk5328-4fs00-3rr3_firmware6gk5208-0ha00-2es6_firmware6gk5204-0ba00-2gf2_firmware6gk5213-3bf00-2ab26gk5206-2bs00-2ac26gk5213-3bb00-2tb2_firmware6gk5204-2aa00-2yf26ag1206-2bs00-7ac26gk5208-0ba00-2ab26gk5208-0ba00-2tb26gk5205-3bd00-2ab26gk5216-0ba00-2fc2_firmware6gk5216-0ha00-2as66gk5205-3bf00-2ab2_firmware6gk5216-0ua00-5es66gk5328-4fs00-2ar3_firmware6gk5224-4gs00-2fc2_firmware6gk5204-0ba00-2gf26gk5205-3bf00-2ab26gk5208-0ga00-2tc26gk5206-2bs00-2fc26gk5206-2gs00-2ac2_firmware6gk5208-0ha00-2es66gk5208-0ba00-2ab2_firmware6gk5216-3rs00-5ac2_firmware6gk5208-0ua00-5es6_firmware6gk5324-0ba00-2ar36gk5328-4fs00-2rr36gk5206-2rs00-2ac2_firmware6gk5208-0ba00-2fc2_firmware6gk5206-2rs00-5ac26gk5224-0ba00-2ac2_firmware6gk5224-4gs00-2ac2_firmware6gk5206-2gs00-2fc2_firmware6gk5208-0ha00-2as6_firmware6gk5205-3bd00-2ab2_firmware6ag1206-2bb00-7ac26ag1216-4bs00-7ac2_firmware6gk5205-3bb00-2tb26gk5324-0ba00-3ar36gk5206-2bd00-2ac26gk5326-2qs00-3rr3_firmware6gk5208-0ha00-2ts6_firmware6gk5206-2rs00-5fc26gk5216-0ua00-5es6_firmware6gk5216-0ha00-2ts6_firmware6gk5328-4fs00-2rr3_firmware6gk5216-4gs00-2fc26gk5213-3bb00-2tb26gk5208-0ga00-2tc2_firmware6gk5213-3bf00-2tb26gk5208-0ha00-2as66gk5224-0ba00-2ac26gk5206-2bd00-2ac2_firmware6gk5213-3bf00-2tb2_firmware6gk5328-4ss00-3ar36gk5216-0ha00-2ts66gk5208-0ba00-2tb2_firmware6gk5205-3bb00-2ab2_firmware6gk5216-3rs00-2ac2_firmware6gk5206-2rs00-5ac2_firmware6gk5216-0ba00-2fc26gk5328-4fs00-2ar36gk5206-2bs00-2fc2_firmware6gk5208-0ga00-2ac2_firmware6ag1206-2bs00-7ac2_firmware6gk5224-4gs00-2ac26gk5216-0ba00-2ac26gk5206-2bb00-2ac26gk5208-0ga00-2ac26ag1208-0ba00-7ac2_firmware6gk5206-2gs00-2tc26gk5208-0ra00-5ac2_firmware6gk5206-2gs00-2fc26gk5213-3bb00-2ab2_firmware6gk5216-4bs00-2ac2_firmware6gk5213-3bd00-2ab2_firmware6gk5326-2qs00-3rr36gk5206-2rs00-5fc2_firmware6gk5216-3rs00-5ac26gk5205-3bd00-2tb26gk5204-2aa00-2yf2_firmware6gk5216-0ha00-2as6_firmware6gk5204-2aa00-2gf26gk5213-3bd00-2tb26gk5216-0ba00-2tb26gk5216-0ha00-2es6_firmware6gk5324-0ba00-2ar3_firmware6gk5216-4gs00-2tc26ag1208-0ba00-7ac26gk5328-4fs00-3ar36gk5216-4gs00-2ac2_firmware6gk5216-0ba00-2tb2_firmware6gk5206-2rs00-2ac26gk5208-0ga00-2fc26gk5208-0ha00-2ts66gk5216-0ha00-2es66gk5208-0ra00-5ac26gk5206-2bb00-2ac2_firmware6gk5206-2gs00-2ac26gk5216-0ba00-2ac2_firmware6gk5224-4gs00-2fc26gk5216-4gs00-2tc2_firmware6ag1216-4bs00-7ac26gk5205-3bd00-2tb2_firmware6gk5324-0ba00-3ar3_firmware6gk5205-3bb00-2ab26gk5208-0ba00-2fc26gk5224-4gs00-2tc2_firmware6gk5206-2gs00-2tc2_firmware6gk5208-0ba00-2ac26gk5204-2aa00-2gf2_firmware6gk5326-2qs00-3ar36gk5216-4bs00-2ac26gk5328-4ss00-3ar3_firmware6gk5213-3bd00-2tb2_firmware6gk5204-0ba00-2yf2_firmware6gk5206-2bs00-2ac2_firmware6gk5213-3bb00-2ab26gk5216-0ba00-2ab2_firmware6ag1206-2bb00-7ac2_firmware6gk5205-3bf00-2tb26gk5204-0ba00-2yf26gk5216-3rs00-2ac26gk5208-0ra00-2ac2_firmware6gk5208-0ra00-2ac26gk5328-4ss00-2ar3SCALANCE WUM763-1 (US)SCALANCE M826-2 SHDSL-RouterSCALANCE WAM766-1 EECSCALANCE WAM766-1SCALANCE MUM856-1 (RoW)SCALANCE WUM763-1SCALANCE WAM766-1 (ME)SCALANCE WAM766-1 (US)SCALANCE M804PBSCALANCE M876-3SCALANCE M876-4SCALANCE MUM856-1 (EU)SCALANCE WUM766-1 (ME)SCALANCE WAM766-1 EEC (US)SCALANCE MUM853-1 (EU)SCALANCE WAB762-1SCALANCE M816-1 ADSL-RouterSCALANCE WUB762-1SCALANCE M876-3 (ROK)SCALANCE M812-1 ADSL-RouterSCALANCE M876-4 (EU)SCALANCE M876-4 (NAM)SCALANCE M874-3SCALANCE WUM766-1SCALANCE M874-2SCALANCE S615 EEC LAN-RouterSCALANCE WUM766-1 (USA)SCALANCE WAM763-1SCALANCE S615 LAN-RouterSCALANCE WAM763-1 (ME)SCALANCE WAM763-1 (US)RUGGEDCOM RM1224 LTE(4G) EUSCALANCE WUB762-1 iFeaturesSCALANCE WAM766-1 EEC (ME)RUGGEDCOM RM1224 LTE(4G) NAM
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-5786
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.68%
||
7 Day CHG~0.00%
Published-26 Oct, 2023 | 15:31
Updated-02 Aug, 2024 | 08:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GeoServer GeoWebCache rest.html direct request

A vulnerability was found in GeoServer GeoWebCache up to 1.15.1. It has been declared as problematic. This vulnerability affects unknown code of the file /geoserver/gwc/rest.html. The manipulation leads to direct request. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243592.

Action-Not Available
Vendor-geoserverGeoServergeoserver
Product-geowebcacheGeoWebCachegeowebcache
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-5702
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.3||MEDIUM
EPSS-29.37% / 96.66%
||
7 Day CHG~0.00%
Published-23 Oct, 2023 | 00:31
Updated-02 Aug, 2024 | 08:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Viessmann Vitogate 300 direct request

A vulnerability was found in Viessmann Vitogate 300 up to 2.1.3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /cgi-bin/. The manipulation leads to direct request. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243140. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-viessmannViessmann
Product-vitogate_300vitogate_300_firmwareVitogate 300
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-45809
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-2.7||LOW
EPSS-0.23% / 45.87%
||
7 Day CHG~0.00%
Published-19 Oct, 2023 | 18:33
Updated-02 Aug, 2024 | 20:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Disclosure of user names via admin bulk action views in wagtail

Wagtail is an open source content management system built on Django. A user with a limited-permission editor account for the Wagtail admin can make a direct URL request to the admin view that handles bulk actions on user accounts. While authentication rules prevent the user from making any changes, the error message discloses the display names of user accounts, and by modifying URL parameters, the user can retrieve the display name for any user. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. Patched versions have been released as Wagtail 4.1.8 (LTS), 5.0.5 and 5.1.3. The fix is also included in Release Candidate 1 of the forthcoming Wagtail 5.2 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-torchboxwagtail
Product-wagtailwagtail
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2023-4800
Assigner-WPScan
ShareView Details
Assigner-WPScan
CVSS Score-6.5||MEDIUM
EPSS-8.94% / 92.68%
||
7 Day CHG~0.00%
Published-16 Oct, 2023 | 19:39
Updated-06 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DoLogin Security < 3.7.1 - Subscriber+ IP Address leak

The DoLogin Security WordPress plugin before 3.7.1 does not restrict the access of a widget that shows the IPs of failed logins to low privileged users.

Action-Not Available
Vendor-wpdoUnknown
Product-dologin_securityDoLogin Security
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-4018
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.09% / 25.96%
||
7 Day CHG~0.00%
Published-01 Sep, 2023 | 10:30
Updated-27 Apr, 2026 | 04:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Direct Request ('Forced Browsing') in GitLab

An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. Due to improper permission validation it was possible to create model experiments in public projects.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-4544
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 7.92%
||
7 Day CHG~0.00%
Published-26 Aug, 2023 | 05:00
Updated-01 Jul, 2025 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Byzoro Smart S85F Management Platform php.ini direct request

A vulnerability was found in Byzoro Smart S85F Management Platform up to 20230809. It has been rated as problematic. This issue affects some unknown processing of the file /config/php.ini. The manipulation leads to direct request. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-238049 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-byzoroByzoro
Product-smart_s85f_management_platformSmart S85F Management Platform
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-3426
Assigner-Liferay, Inc.
ShareView Details
Assigner-Liferay, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.40% / 61.18%
||
7 Day CHG~0.00%
Published-02 Aug, 2023 | 09:40
Updated-30 Jan, 2026 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations.

Action-Not Available
Vendor-Liferay Inc.
Product-digital_experience_platformliferay_portalDXPPortal
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CWE ID-CWE-862
Missing Authorization
CVE-2023-3792
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.3||MEDIUM
EPSS-0.12% / 30.78%
||
7 Day CHG+0.01%
Published-20 Jul, 2023 | 19:00
Updated-02 Aug, 2024 | 07:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Beijing Netcon NS-ASG test_status.php direct request

A vulnerability was found in Beijing Netcon NS-ASG 6.3. It has been classified as problematic. This affects an unknown part of the file /admin/test_status.php. The manipulation leads to direct request. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235059. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-netentsecBeijing Netcon
Product-application_security_gatewayNS-ASG
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2015-1313
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.00% / 0.02%
||
7 Day CHG~0.00%
Published-29 Jun, 2023 | 14:07
Updated-26 Nov, 2024 | 19:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JetBrains TeamCity 8 and 9 before 9.0.2 allows bypass of account-creation restrictions via a crafted request because the required request data can be deduced by reading HTML and JavaScript files that are returned to the web browser after an initial unauthenticated request.

Action-Not Available
Vendor-JetBrains s.r.o.
Product-teamcityTeamCity
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-22834
Assigner-Palantir Technologies
ShareView Details
Assigner-Palantir Technologies
CVSS Score-2.7||LOW
EPSS-0.05% / 16.63%
||
7 Day CHG~0.00%
Published-26 Jun, 2023 | 23:06
Updated-07 Nov, 2024 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The contour service was not checking that users had permission to create an analysis for a given dataset

The Contour Service was not checking that users had permission to create an analysis for a given dataset. This could allow an attacker to clutter up Compass folders with extraneous analyses, that the attacker would otherwise not have permission to create.

Action-Not Available
Vendor-palantirPalantir
Product-contourcom.palantir.contour:contour-dispatch
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CWE ID-CWE-862
Missing Authorization
CVE-2023-28160
Assigner-Mozilla Corporation
ShareView Details
Assigner-Mozilla Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.24% / 47.04%
||
7 Day CHG~0.00%
Published-02 Jun, 2023 | 00:00
Updated-09 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When following a redirect to a publicly accessible web extension file, the URL may have been translated to the actual local path, leaking potentially sensitive information. This vulnerability affects Firefox < 111.

Action-Not Available
Vendor-Mozilla Corporation
Product-firefoxFirefox
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-2524
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.28% / 51.85%
||
7 Day CHG~0.00%
Published-04 May, 2023 | 18:31
Updated-29 Jan, 2025 | 17:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Control iD RHiD direct request

A vulnerability classified as critical has been found in Control iD RHiD 23.3.19.0. This affects an unknown part of the file /v2/#/. The manipulation leads to direct request. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-228015. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-controlidControl iD
Product-rhidRHiD
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-1699
Assigner-Rapid7, Inc.
ShareView Details
Assigner-Rapid7, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.24% / 46.92%
||
7 Day CHG~0.00%
Published-30 Mar, 2023 | 09:26
Updated-11 Feb, 2025 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rapid7 Nexpose Forced Browsing

Rapid7 Nexpose versions 6.6.186 and below suffer from a forced browsing vulnerability.  This vulnerability allows an attacker to manipulate URLs to forcefully browse to and access administrative pages. This vulnerability is fixed in version 6.6.187.  

Action-Not Available
Vendor-Rapid7 LLC
Product-nexposeNexpose
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-1663
Assigner-Black Duck Software, Inc.
ShareView Details
Assigner-Black Duck Software, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 42.18%
||
7 Day CHG~0.00%
Published-29 Mar, 2023 | 13:16
Updated-12 Feb, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authenticated Resources Accessible via Forced Browsing

Coverity versions prior to 2023.3.2 are vulnerable to forced browsing, which exposes authenticated resources to unauthorized actors. The root cause of this vulnerability is an insecurely configured servlet mapping for the underlying Apache Tomcat server. As a result, the downloads directory and its contents are accessible. 5.9 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C)

Action-Not Available
Vendor-synopsysSynopsys
Product-coverityCoverity
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2023-1682
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.3||MEDIUM
EPSS-0.29% / 52.53%
||
7 Day CHG~0.00%
Published-28 Mar, 2023 | 23:31
Updated-02 Aug, 2024 | 05:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Xunrui CMS Install.txt direct request

A vulnerability has been found in Xunrui CMS 4.61 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dayrui/My/Config/Install.txt. The manipulation leads to direct request. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224239.

Action-Not Available
Vendor-xunruicmsXunrui
Product-xunruicmsCMS
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-42438
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.32% / 55.32%
||
7 Day CHG~0.00%
Published-08 Feb, 2023 | 18:59
Updated-25 Mar, 2025 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Cloud Pak for Multicloud Management Monitoring privilege escalation

IBM Cloud Pak for Multicloud Management Monitoring 2.0 and 2.3 allows users without admin roles access to admin functions by specifying direct URL paths. IBM X-Force ID: 238210.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-cloud_pak_for_multicloud_management_monitoringlinux_kernelCloud Pak for Multicloud Management Monitoring
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-47700
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.19% / 40.04%
||
7 Day CHG~0.00%
Published-31 Jan, 2023 | 00:00
Updated-27 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

COMFAST (Shenzhen Sihai Zhonglian Network Technology Co., Ltd) CF-WR623N Router firmware V2.3.0.1 and before is vulnerable to Incorrect Access Control. Improper authentication allows requests to be made to back-end scripts without a valid session or authentication.

Action-Not Available
Vendor-comfast_projectn/a
Product-cf-wr623n_firmwarecf-wr623nn/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-4057
Assigner-WPScan
ShareView Details
Assigner-WPScan
CVSS Score-5.3||MEDIUM
EPSS-45.39% / 97.65%
||
7 Day CHG~0.00%
Published-02 Jan, 2023 | 21:49
Updated-10 Apr, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Autoptimize < 3.1.0 - Sensitive Data Disclosure

The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin's exported settings and logs.

Action-Not Available
Vendor-optimizingmattersUnknown
Product-autooptimizeAutoptimize
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-42953
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-10.88% / 93.47%
||
7 Day CHG~0.00%
Published-25 Dec, 2022 | 00:00
Updated-15 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain ZKTeco products (ZEM500-510-560-760, ZEM600-800, ZEM720, ZMM) allow access to sensitive information via direct requests for the form/DataApp?style=1 and form/DataApp?style=0 URLs. The affected versions may be before 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and 15.00 (ZMM200-220-210). The fixed versions are firmware version 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and firmware version 15.00 (ZMM200-220-210).

Action-Not Available
Vendor-n/aZKTeco Co., Ltd.
Product-zem760zmm220_firmwarezmm220zmm200zem720_firmwarezem720zem500zem560zem600_firmwarezem600zem510_firmwarezmm210zmm200_firmwarezem760_firmwarezem800_firmwarezem800zmm210_firmwarezem510zem560_firmwarezem500_firmwaren/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-25626
Assigner-Symantec - A Division of Broadcom
ShareView Details
Assigner-Symantec - A Division of Broadcom
CVSS Score-5.3||MEDIUM
EPSS-0.73% / 72.78%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-18 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unauthenticated user can access Identity Manager’s management console specific page URLs. However, the system doesn’t allow the user to carry out server side tasks without a valid web session.

Action-Not Available
Vendor-n/aBroadcom Inc.
Product-symantec_identity_governance_and_administrationSymantec Identity Governance and Administration
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-45276
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.52% / 81.43%
||
7 Day CHG~0.00%
Published-23 Nov, 2022 | 00:00
Updated-25 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in the /index/user/user_edit.html component of YJCMS v1.0.9 allows unauthenticated attackers to obtain the Administrator account password.

Action-Not Available
Vendor-eyunjingn/a
Product-yjcmsn/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-40845
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.28% / 51.45%
||
7 Day CHG~0.00%
Published-15 Nov, 2022 | 00:00
Updated-07 Jul, 2025 | 18:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Tenda AC1200 Router model W15Ev2 V15.11.0.10(1576) is affected by a password exposure vulnerability. When combined with the improper authorization/improper session management vulnerability, an attacker with access to the router may be able to expose sensitive information which they're not explicitly authorized to have.

Action-Not Available
Vendor-n/aTenda Technology Co., Ltd.
Product-w15e_firmwarew15en/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-42197
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 32.14%
||
7 Day CHG~0.00%
Published-20 Oct, 2022 | 00:00
Updated-08 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Simple Exam Reviewer Management System v1.0 the User List function has improper access control that allows low privileged users to modify user permissions to higher privileges.

Action-Not Available
Vendor-simple_exam_reviewer_management_system_projectn/a
Product-simple_exam_reviewer_management_systemn/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-42238
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.31% / 54.20%
||
7 Day CHG~0.00%
Published-11 Oct, 2022 | 00:00
Updated-20 May, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Vertical Privilege Escalation issue in Merchandise Online Store v.1.0 allows an attacker to get access to the admin dashboard.

Action-Not Available
Vendor-merchandise_online_store_projectn/a
Product-merchandise_online_storen/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-41746
Assigner-Trend Micro, Inc.
ShareView Details
Assigner-Trend Micro, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.83% / 74.81%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 00:00
Updated-03 Aug, 2024 | 12:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A forced browsing vulnerability in Trend Micro Apex One could allow an attacker with access to the Apex One console on affected installations to escalate privileges and modify certain agent groupings. Please note: an attacker must first obtain the ability to log onto the Apex One web console in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsTrend Micro Apex One
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-36158
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.50% / 65.94%
||
7 Day CHG~0.00%
Published-26 Sep, 2022 | 10:07
Updated-21 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Contec FXA3200 version 1.13.00 and under suffers from Insecure Permissions in the Wireless LAN Manager interface which allows malicious actors to execute Linux commands with root privilege via a hidden web page (/usr/www/ja/mnt_cmd.cgi).

Action-Not Available
Vendor-contecn/a
Product-fxa2000_firmwarefxa3000fxa3020_firmwarefxa2000fxa3020fxa3200fxa3200_firmwarefxa3000_firmwaren/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-2551
Assigner-WPScan
ShareView Details
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-59.71% / 98.28%
||
7 Day CHG~0.00%
Published-22 Aug, 2022 | 15:03
Updated-02 Feb, 2026 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Duplicator < 1.4.7 - Unauthenticated Backup Download

The Duplicator WordPress plugin before 1.4.7 discloses the url of the a backup to unauthenticated visitors accessing the main installer endpoint of the plugin, if the installer script has been run once by an administrator, allowing download of the full site backup without authenticating.

Action-Not Available
Vendor-UnknownAwesome Motive Inc.Snap Creek, LLC (Duplicator)
Product-duplicatorDuplicator – WordPress Migration Plugin
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-2544
Assigner-WPScan
ShareView Details
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-34.47% / 97.06%
||
7 Day CHG~0.00%
Published-22 Aug, 2022 | 15:03
Updated-03 Aug, 2024 | 00:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ninja Job Board < 1.3.3 - Resume Disclosure via Directory Listing

The Ninja Job Board WordPress plugin before 1.3.3 does not protect the directory where it stores uploaded resumes, making it vulnerable to unauthenticated Directory Listing which allows the download of uploaded resumes.

Action-Not Available
Vendor-wpmanageninjaUnknown
Product-ninja_job_boardNinja Job Board – Ultimate WordPress Job Board Plugin
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-34574
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.7||MEDIUM
EPSS-0.08% / 22.84%
||
7 Day CHG~0.00%
Published-25 Jul, 2022 | 21:37
Updated-03 Aug, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the key information of the device via accessing Tftpd32.ini.

Action-Not Available
Vendor-n/aWAVLINK Technology Ltd.
Product-wifi-repeater_firmwaren/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-34573
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.08% / 22.84%
||
7 Day CHG~0.00%
Published-25 Jul, 2022 | 21:37
Updated-03 Aug, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to arbitrarily configure device settings via accessing the page mb_wifibasic.shtml.

Action-Not Available
Vendor-n/aWAVLINK Technology Ltd.
Product-wifi-repeater_firmwaren/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-34572
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.7||MEDIUM
EPSS-0.08% / 22.84%
||
7 Day CHG~0.00%
Published-25 Jul, 2022 | 21:37
Updated-03 Aug, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the telnet password via accessing the page tftp.txt.

Action-Not Available
Vendor-n/aWAVLINK Technology Ltd.
Product-wifi-repeater_firmwaren/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-34571
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8||HIGH
EPSS-0.15% / 35.11%
||
7 Day CHG~0.00%
Published-25 Jul, 2022 | 21:37
Updated-03 Aug, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the system key information and execute arbitrary commands via accessing the page syslog.shtml.

Action-Not Available
Vendor-n/aWAVLINK Technology Ltd.
Product-wifi-repeater_firmwaren/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-34570
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.29% / 52.16%
||
7 Day CHG~0.00%
Published-25 Jul, 2022 | 21:37
Updated-03 Aug, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WAVLINK WN579 X3 M79X3.V5030.191012/M79X3.V5030.191012 contains an information leak which allows attackers to obtain the key information via accessing the messages.txt page.

Action-Not Available
Vendor-n/aWAVLINK Technology Ltd.
Product-wl-wn579x3_firmwarewl-wn579x3n/a
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CWE ID-CWE-425
Direct Request ('Forced Browsing')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next