Vulnerabilities > Incorrect Authorization

DATE CVE VULNERABILITY TITLE RISK
2023-04-26 CVE-2022-25274 Incorrect Authorization vulnerability in Drupal
Drupal 9.3 implemented a generic entity access API for entity revisions.
network
low complexity
drupal CWE-863
5.4
2023-04-25 CVE-2023-24512 Incorrect Authorization vulnerability in Arista products
On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch.
network
low complexity
arista CWE-863
6.5
2023-04-24 CVE-2023-2257 Incorrect Authorization vulnerability in Devolutions Workspace 2023.1.1.3
Authentication Bypass in Hub Business integration in Devolutions Workspace Desktop 2023.1.1.3 and earlier on Windows and macOS allows an attacker with access to the user interface to unlock a Hub Business space without being prompted to enter the password via an unimplemented "Force Login" security feature. This vulnerability occurs only if "Force Login" feature is enabled on the Hub Business instance and that an attacker has access to a locked Workspace desktop application configured with a Hub Business space.
local
low complexity
devolutions CWE-863
7.8
2023-04-24 CVE-2023-26097 Incorrect Authorization vulnerability in Telindus Apsal 3.14.2022.235B
An issue was discovered in Telindus Apsal 3.14.2022.235 b.
local
low complexity
telindus CWE-863
5.5
2023-04-24 CVE-2023-30544 Incorrect Authorization vulnerability in Kiwitcms Kiwi Tcms
Kiwi TCMS is an open source test management system.
network
low complexity
kiwitcms CWE-863
4.3
2023-04-19 CVE-2023-20950 Incorrect Authorization vulnerability in Google Android 11.0/12.0/12.1
In AlarmManagerActivity of AlarmManagerActivity.java, there is a possible way to bypass background activity launch restrictions via a pendingIntent.
local
low complexity
google CWE-863
7.8
2023-04-18 CVE-2023-2020 Incorrect Authorization vulnerability in Checkmk 2.1.0/2.2.0
Insufficient permission checks in the REST API in Tribe29 Checkmk <= 2.1.0p27 and <= 2.2.0b4 (beta) allow unauthorized users to schedule downtimes for any host.
network
low complexity
checkmk CWE-863
4.3
2023-04-15 CVE-2020-17354 Incorrect Authorization vulnerability in Lilypond
LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format.
local
low complexity
lilypond CWE-863
8.6
2023-04-12 CVE-2023-22620 Incorrect Authorization vulnerability in Securepoint Unified Threat Management
An issue was discovered in SecurePoint UTM before 12.2.5.1.
network
high complexity
securepoint CWE-863
7.5
2023-04-11 CVE-2023-25415 Incorrect Authorization vulnerability in Aten Pe8108 Firmware 2.4.232
Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control.
network
low complexity
aten CWE-863
5.3