Vulnerabilities > Incorrect Authorization
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-07-05 | CVE-2023-34107 | Incorrect Authorization vulnerability in Glpi-Project Glpi GLPI is a free asset and IT management software package. | 6.5 |
2023-07-05 | CVE-2023-34106 | Incorrect Authorization vulnerability in Glpi-Project Glpi GLPI is a free asset and IT management software package. | 6.5 |
2023-07-05 | CVE-2021-46891 | Incorrect Authorization vulnerability in Huawei Emui and Harmonyos Vulnerability of incomplete read and write permission verification in the GPU module. | 9.8 |
2023-07-05 | CVE-2021-46890 | Incorrect Authorization vulnerability in Huawei Emui and Harmonyos Vulnerability of incomplete read and write permission verification in the GPU module. | 9.8 |
2023-07-03 | CVE-2023-26258 | Incorrect Authorization vulnerability in Arcserve UDP Arcserve UDP through 9.0.6034 allows authentication bypass. | 9.8 |
2023-06-29 | CVE-2023-30955 | Incorrect Authorization vulnerability in Palantir Foundry Workspace-Server A security defect was identified in Foundry workspace-server that enabled a user to bypass an authorization check and view settings related to 'Developer Mode'. | 5.4 |
2023-06-29 | CVE-2023-33190 | Incorrect Authorization vulnerability in Sealos Project Sealos Sealos is an open source cloud operating system distribution based on the Kubernetes kernel. | 9.8 |
2023-06-28 | CVE-2023-21225 | Incorrect Authorization vulnerability in Google Android there is a possible way to bypass the protected confirmation screen due to Failure to lock display power. | 7.8 |
2023-06-23 | CVE-2023-35165 | Incorrect Authorization vulnerability in Amazon AWS Cloud Development KIT AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. | 8.8 |
2023-06-22 | CVE-2023-3114 | Incorrect Authorization vulnerability in Hashicorp Terraform Enterprise Terraform Enterprise since v202207-1 did not properly implement authorization rules for agent pools, allowing the workspace to be targeted by unauthorized agents. | 7.7 |