Vulnerabilities (CVE)

Filtered by CWE-276
Total 1021 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-22440 1 Intel 1 Setup And Configuration Software 2024-11-21 N/A 6.7 MEDIUM
Incorrect default permissions in the Intel(R) SCS Add-on software installer for Microsoft SCCM all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-21512 1 Samsung 1 Android 2024-11-21 N/A 2.4 LOW
Improper Knox ID validation logic in notification framework prior to SMR Jun-2023 Release 1 allows local attackers to read work profile notifications without proper access permission.
CVE-2023-21433 1 Samsung 1 Galaxy Store 2024-11-21 N/A 7.8 HIGH
Improper access control vulnerability in Galaxy Store prior to version 4.5.49.8 allows local attackers to install applications from Galaxy Store.
CVE-2023-21107 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In retrieveAppEntry of NotificationAccessDetails.java, there is a missing permission check. This could lead to local escalation of privilege across user boundaries with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-259385017
CVE-2023-21104 1 Google 1 Android 2024-11-21 N/A 5.5 MEDIUM
In applySyncTransaction of WindowOrganizer.java, a missing permission check could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-259938771
CVE-2023-20178 1 Cisco 2 Anyconnect Secure Mobility Client, Secure Client 2024-11-21 N/A 7.8 HIGH
A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established. This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.
CVE-2023-20043 1 Cisco 1 Cx Cloud Agent 2024-11-21 N/A 6.7 MEDIUM
A vulnerability in Cisco CX Cloud Agent of could allow an authenticated, local attacker to elevate their privileges. This vulnerability is due to insecure file permissions. An attacker could exploit this vulnerability by calling the script with sudo. A successful exploit could allow the attacker to take complete control of the affected device.
CVE-2023-1229 1 Google 1 Chrome 2024-11-21 N/A 4.3 MEDIUM
Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)
CVE-2023-0181 6 Citrix, Linux, Microsoft and 3 more 6 Hypervisor, Linux Kernel, Windows and 3 more 2024-11-21 N/A 7.1 HIGH
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in a kernel mode layer handler, where memory permissions are not correctly checked, which may lead to denial of service and data tampering.
CVE-2022-4964 1 Canonical 1 Ubuntu Pipewire-pulse 2024-11-21 N/A 5.5 MEDIUM
Ubuntu's pipewire-pulse in snap grants microphone access even when the snap interface for audio-record is not set.
CVE-2022-4575 1 Lenovo 26 Thinkpad 25, Thinkpad 25 Firmware, Thinkpad L560 and 23 more 2024-11-21 N/A 6.7 MEDIUM
A vulnerability due to improper write protection of UEFI variables was reported in the BIOS of some ThinkPad models could allow an attacker with physical or local access and elevated privileges the ability to bypass Secure Boot.
CVE-2022-4568 1 Lenovo 1 System Update 2024-11-21 N/A 7.0 HIGH
A directory permissions management vulnerability in Lenovo System Update may allow elevation of privileges.
CVE-2022-4039 1 Redhat 6 Enterprise Linux, Openshift Container Platform, Openshift Container Platform For Ibm Z and 3 more 2024-11-21 N/A 8.0 HIGH
A flaw was found in Red Hat Single Sign-On for OpenShift container images, which are configured with an unsecured management interface enabled. This flaw allows an attacker to use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.
CVE-2022-4020 1 Acer 10 Aspire A115-21, Aspire A115-21 Firmware, Aspire A315-22 and 7 more 2024-11-21 N/A 8.1 HIGH
Vulnerability in the HQSwSmiDxe DXE driver on some consumer Acer Notebook devices may allow an attacker with elevated privileges to modify UEFI Secure Boot settings by modifying an NVRAM variable.
CVE-2022-48685 2024-11-21 N/A 7.7 HIGH
An issue was discovered in Logpoint 7.1 before 7.1.2. The daily executed cron file clean_secbi_old_logs is writable by all users and is executed as root, leading to privilege escalation.
CVE-2022-48360 1 Huawei 2 Emui, Harmonyos 2024-11-21 N/A 7.5 HIGH
The facial recognition module has a vulnerability in file permission control. Successful exploitation of this vulnerability may affect confidentiality.
CVE-2022-47551 1 Apiman 1 Apiman 2024-11-21 N/A 6.5 MEDIUM
Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. The root cause of the issue is the Apiman project's accidental acceptance of a large contribution that was not fully compatible with the security model of Apiman versions before 3.0.0.Final. Because of this, 3.0.0.Final is not affected by the vulnerability.
CVE-2022-46774 1 Ibm 2 Manage Application, Maximo Application Suite 2024-11-21 N/A 5.4 MEDIUM
IBM Manage Application 8.8.0 and 8.9.0 in the IBM Maximo Application Suite is vulnerable to incorrect default permissions which could give access to a user to actions that they should not have access to. IBM X-Force ID: 242953.
CVE-2022-46382 1 Rackn 1 Digital Rebar 2024-11-21 N/A 8.8 HIGH
RackN Digital Rebar through 4.6.14, 4.7 through 4.7.22, 4.8 through 4.8.5, 4.9 through 4.9.12, and 4.10 through 4.10.8 has Insecure Permissions. After signing into Digital Rebar, users are issued authentication tokens tied to their account to perform actions within Digital Rebar. During the validation process of these tokens, Digital Rebar did not check if the user account still exists. Deleted Digital Rebar users could still use their tokens to perform actions within Digital Rebar.
CVE-2022-45793 1 Omron 1 Automation Software Sysmac Studio 2024-11-21 N/A 5.5 MEDIUM
Sysmac Studio installs executables in a directory with poor permissions. This can allow a locally-authenticated attacker to overwrite files which will result in code execution with privileges of a different user.