Vulnerabilities > Incorrect Authorization
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-03-21 | CVE-2024-27933 | Incorrect Authorization vulnerability in Deno 1.39.0 Deno is a JavaScript, TypeScript, and WebAssembly runtime. | 8.8 |
2024-03-07 | CVE-2024-28229 | Incorrect Authorization vulnerability in Jetbrains Youtrack In JetBrains YouTrack before 2024.1.25893 user without appropriate permissions could restore issues and articles | 6.5 |
2024-03-07 | CVE-2024-0199 | Incorrect Authorization vulnerability in Gitlab An authorization bypass vulnerability was discovered in GitLab affecting versions 11.3 prior to 16.7.7, 16.7.6 prior to 16.8.4, and 16.8.3 prior to 16.9.2. | 8.0 |
2024-03-06 | CVE-2024-27915 | Incorrect Authorization vulnerability in Sulu Sulu is a PHP content management system. | 8.1 |
2024-03-06 | CVE-2024-27288 | Incorrect Authorization vulnerability in Fit2Cloud 1Panel 1Panel is an open source Linux server operation and maintenance management panel. | 3.1 |
2024-03-06 | CVE-2024-24761 | Incorrect Authorization vulnerability in Galette 1.0.0/1.0.1 Galette is a membership management web application for non profit organizations. | 7.5 |
2024-03-06 | CVE-2024-28174 | Incorrect Authorization vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2023.11.4 presigned URL generation requests in S3 Artifact Storage plugin were authorized improperly | 5.8 |
2024-02-28 | CVE-2024-24773 | Incorrect Authorization vulnerability in Apache Superset Improper parsing of nested SQL statements on SQLLab would allow authenticated users to surpass their data authorization scope. This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1. Users are recommended to upgrade to version 3.1.1, which fixes the issue. | 6.5 |
2024-02-21 | CVE-2023-42860 | Incorrect Authorization vulnerability in Apple Macos A permissions issue was addressed with additional restrictions. | 5.5 |
2024-02-20 | CVE-2024-1155 | Incorrect Authorization vulnerability in Emerson products Incorrect permissions in the installation directories for shared SystemLink Elixir based services may allow an authenticated user to potentially enable escalation of privilege via local access. | 7.8 |