Lucene search

K
EasyappointmentsEasyappointments

14 matches found

CVE
CVE
added 2024/07/09 11:15 a.m.68 views

CVE-2023-3289

A BOLA vulnerability in POST /services allows a low privileged user to create a service for any user in the system (including admin). This results in unauthorized data manipulation.

7.7CVSS6.5AI score0.00154EPSS
CVE
CVE
added 2024/07/09 11:15 a.m.51 views

CVE-2023-3288

A BOLA vulnerability in POST /providers allows a low privileged user to create a privileged user (provider) in the system. This results in privilege escalation.

8.8CVSS8.4AI score0.00186EPSS
CVE
CVE
added 2024/07/09 11:15 a.m.50 views

CVE-2023-3286

A BOLA vulnerability in POST /secretaries allows a low privileged user to create a low privileged user (secretary) in the system. This results in unauthorized data manipulation.

7.7CVSS6.4AI score0.00154EPSS
CVE
CVE
added 2024/07/09 11:15 a.m.49 views

CVE-2023-3287

A BOLA vulnerability in POST /admins allows a low privileged user to create a high privileged user (admin) in the system. This results in privilege escalation.

9.9CVSS8.8AI score0.00198EPSS
CVE
CVE
added 2024/07/09 11:15 a.m.46 views

CVE-2023-38048

A BOLA vulnerability in GET, PUT, DELETE /providers/{providerId} allows a low privileged user to fetch, modify or delete a privileged user (provider). This results in unauthorized access and unauthorized data manipulation.

9.9CVSS8.5AI score0.00191EPSS
Web
CVE
CVE
added 2024/07/09 11:15 a.m.42 views

CVE-2023-3290

A BOLA vulnerability in POST /customers allows a low privileged user to create a low privileged user (customer) in the system. This results in unauthorized data manipulation.

5CVSS4.8AI score0.0016EPSS
CVE
CVE
added 2024/07/09 11:15 a.m.41 views

CVE-2023-38055

A BOLA vulnerability in GET, PUT, DELETE /services/{serviceId} allows a low privileged user to fetch, modify or delete the services of any user (including admin). This results in unauthorized access and unauthorized data manipulation.

9.6CVSS8.4AI score0.00173EPSS
Web
CVE
CVE
added 2024/07/09 11:15 a.m.40 views

CVE-2023-38052

A BOLA vulnerability in GET, PUT, DELETE /admins/{adminId} allows a low privileged user to fetch, modify or delete a high privileged user (admin). This results in unauthorized access and unauthorized data manipulation.

9.9CVSS8.3AI score0.00191EPSS
Web
CVE
CVE
added 2024/07/09 11:15 a.m.38 views

CVE-2023-38049

A BOLA vulnerability in GET, PUT, DELETE /appointments/{appointmentId} allows a low privileged user to fetch, modify or delete an appointment of any user (including admin). This results in unauthorized access and unauthorized data manipulation.

9.9CVSS8.5AI score0.00164EPSS
Web
CVE
CVE
added 2024/07/09 11:15 a.m.38 views

CVE-2023-38050

A BOLA vulnerability in GET, PUT, DELETE /webhooks/{webhookId} allows a low privileged user to fetch, modify or delete a webhook of any user (including admin). This results in unauthorized access and unauthorized data manipulation.

9.1CVSS8.3AI score0.00113EPSS
Web
CVE
CVE
added 2024/07/09 11:15 a.m.38 views

CVE-2023-38054

A BOLA vulnerability in GET, PUT, DELETE /customers/{customerId} allows a low privileged user to fetch, modify or delete a low privileged user (customer). This results in unauthorized access and unauthorized data manipulation.

9.9CVSS8.5AI score0.00164EPSS
Web
CVE
CVE
added 2024/07/09 11:15 a.m.37 views

CVE-2023-38047

A BOLA vulnerability in GET, PUT, DELETE /categories/{categoryId} allows a low privileged user to fetch, modify or delete the category of any user (including admin). This results in unauthorized access and unauthorized data manipulation.

8.5CVSS7.8AI score0.00091EPSS
Web
CVE
CVE
added 2024/07/09 11:15 a.m.37 views

CVE-2023-38051

A BOLA vulnerability in GET, PUT, DELETE /secretaries/{secretaryId} allows a low privileged user to fetch, modify or delete a low privileged user (secretary). This results in unauthorized access and unauthorized data manipulation.

9.9CVSS8.5AI score0.00164EPSS
Web
CVE
CVE
added 2024/07/09 11:15 a.m.37 views

CVE-2023-38053

A BOLA vulnerability in GET, PUT, DELETE /settings/{settingName} allows a low privileged user to fetch, modify or delete the settings of any user (including admin). This results in unauthorized access and unauthorized data manipulation.

9.9CVSS8.5AI score0.00164EPSS
Web