Vulnerabilities > Incorrect Authorization
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-11-16 | CVE-2018-7363 | Incorrect Authorization vulnerability in ZTE Zxhn F670 Firmware All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by improper authorization vulnerability. | 8.8 |
2018-11-15 | CVE-2018-16620 | Incorrect Authorization vulnerability in Sonatype Nexus Repository Manager Sonatype Nexus Repository Manager before 3.14 has Incorrect Access Control. | 7.5 |
2018-11-13 | CVE-2018-6980 | Incorrect Authorization vulnerability in VMWare Vrealize LOG Insight 4.6/4.6.1/4.7 VMware vRealize Log Insight (4.7.x before 4.7.1 and 4.6.x before 4.6.2) contains a vulnerability due to improper authorization in the user registration method. | 7.2 |
2018-11-13 | CVE-2018-7926 | Incorrect Authorization vulnerability in Huawei Watch 2 Firmware Owdd.180707.001.E1 Huawei Watch 2 with versions and earlier than OWDD.180707.001.E1 have an improper authorization vulnerability. | 4.6 |
2018-11-13 | CVE-2018-7925 | Incorrect Authorization vulnerability in Huawei Emily-Al00A Firmware The radio module of some Huawei smartphones Emily-AL00A The versions before 8.1.0.171(C00) have a lock-screen bypass vulnerability. | 6.8 |
2018-11-06 | CVE-2018-9488 | Incorrect Authorization vulnerability in Google Android 8.0/8.1/9.0 In the SELinux permissions of crash_dump.te, there is a permissions bypass due to a missing restriction. | 7.8 |
2018-10-25 | CVE-2018-14665 | Incorrect Authorization vulnerability in multiple products A flaw was found in xorg-x11-server before 1.20.3. | 6.6 |
2018-10-18 | CVE-2018-12369 | Incorrect Authorization vulnerability in multiple products WebExtensions bundled with embedded experiments were not correctly checked for proper authorization. | 9.8 |
2018-10-09 | CVE-2018-17857 | Incorrect Authorization vulnerability in Joomla Joomla! An issue was discovered in Joomla! before 3.8.13. | 4.3 |
2018-10-08 | CVE-2018-1000805 | Incorrect Authorization vulnerability in multiple products Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. | 8.8 |