Vulnerabilities > Incorrect Authorization

DATE CVE VULNERABILITY TITLE RISK
2023-03-21 CVE-2023-25923 Incorrect Authorization vulnerability in IBM Security KEY Lifecycle Manager
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 could allow an attacker to upload files that could be used in a denial of service attack due to incorrect authorization.
network
low complexity
ibm CWE-863
7.5
2023-03-20 CVE-2023-27578 Incorrect Authorization vulnerability in Galaxyproject Galaxy
Galaxy is an open-source platform for data analysis.
network
low complexity
galaxyproject CWE-863
7.5
2023-03-20 CVE-2023-0940 Incorrect Authorization vulnerability in Metagauss Profilegrid
The ProfileGrid WordPress plugin before 5.3.1 provides an AJAX endpoint for resetting a user password but does not implement proper authorization.
network
low complexity
metagauss CWE-863
8.8
2023-03-17 CVE-2023-27594 Incorrect Authorization vulnerability in Cilium
Cilium is a networking, observability, and security solution with an eBPF-based dataplane.
network
low complexity
cilium CWE-863
7.3
2023-03-15 CVE-2023-26484 Incorrect Authorization vulnerability in Kubevirt
KubeVirt is a virtual machine management add-on for Kubernetes.
network
high complexity
kubevirt CWE-863
8.2
2023-03-14 CVE-2023-24880 Incorrect Authorization vulnerability in Microsoft products
Windows SmartScreen Security Feature Bypass Vulnerability
local
low complexity
microsoft CWE-863
4.4
2023-03-14 CVE-2022-39214 Incorrect Authorization vulnerability in Combodo Itop
Combodo iTop is an open source, web-based IT service management platform.
network
high complexity
combodo CWE-863
7.5
2023-03-11 CVE-2023-24999 Incorrect Authorization vulnerability in Hashicorp Vault
HashiCorp Vault and Vault Enterprise’s approle auth method allowed any authenticated user with access to an approle destroy endpoint to destroy the secret ID of any other role by providing the secret ID accessor.
network
low complexity
hashicorp CWE-863
8.1
2023-03-10 CVE-2023-27899 Incorrect Authorization vulnerability in Jenkins
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution.
local
high complexity
jenkins CWE-863
7.0
2023-03-10 CVE-2023-27903 Incorrect Authorization vulnerability in Jenkins
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used.
local
low complexity
jenkins CWE-863
4.4