Vulnerabilities (CVE)

Filtered by CWE-732
Total 1265 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-31155 1 Umask Project 1 Umask 2024-11-21 7.2 HIGH 7.8 HIGH
Failure to normalize the umask in please before 0.4 allows a local attacker to gain full root privileges if they are allowed to execute at least one command.
CVE-2021-30964 1 Apple 4 Ipados, Iphone Os, Macos and 1 more 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
An inherited permissions issue was addressed with additional restrictions. This issue is fixed in macOS Monterey 12.1, watchOS 8.3, iOS 15.2 and iPadOS 15.2. A malicious application may be able to bypass Privacy preferences.
CVE-2021-30920 1 Apple 1 Macos 2024-11-21 2.1 LOW 5.5 MEDIUM
A permissions issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.0.1. A local attacker may be able to read sensitive information.
CVE-2021-30892 1 Apple 2 Mac Os X, Macos 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
An inherited permissions issue was addressed with additional restrictions. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to modify protected parts of the file system.
CVE-2021-30577 2 Fedoraproject, Google 2 Fedora, Chrome 2024-11-21 6.8 MEDIUM 7.8 HIGH
Insufficient policy enforcement in Installer in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform local privilege escalation via a crafted file.
CVE-2021-29396 1 Globalnorthstar 1 Northstar Club Management 2024-11-21 7.5 HIGH 9.8 CRITICAL
Systemic Insecure Permissions in Northstar Technologies Inc NorthStar Club Management 6.3 allows remote unauthenticated users to use various functionalities without authentication.
CVE-2021-29247 1 Btcpayserver 1 Btcpay Server 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
BTCPay Server through 1.0.7.0 could allow a remote attacker to obtain sensitive information, caused by failure to set the HTTPOnly flag for a cookie.
CVE-2021-28646 1 Trendmicro 2 Apex One, Officescan 2024-11-21 2.1 LOW 5.5 MEDIUM
An insecure file permissions vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a local attacker to take control of a specific log file on affected installations.
CVE-2021-28645 1 Trendmicro 2 Apex One, Officescan 2024-11-21 7.2 HIGH 7.8 HIGH
An incorrect permission assignment vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2021-28374 1 Debian 2 Courier-authlib, Debian Linux 2024-11-21 5.0 MEDIUM 7.5 HIGH
The Debian courier-authlib package before 0.71.1-2 for Courier Authentication Library creates a /run/courier/authdaemon directory with weak permissions, allowing an attacker to read user information. This may include a cleartext password in some configurations. In general, it includes the user's existence, uid and gids, home and/or Maildir directory, quota, and some type of password information (such as a hash).
CVE-2021-28269 1 Soyal 1 701client 2024-11-21 6.5 MEDIUM 8.8 HIGH
Soyal Technology 701Client 9.0.1 is vulnerable to Insecure permissions via client.exe binary with Authenticated Users group with Full permissions.
CVE-2021-28098 1 Forescout 1 Counteract 2024-11-21 4.4 MEDIUM 7.8 HIGH
An issue was discovered in Forescout CounterACT before 8.1.4. A local privilege escalation vulnerability is present in the logging function. SecureConnector runs with administrative privileges and writes logs entries to a file in %PROGRAMDATA%\ForeScout SecureConnector\ that has full permissions for the Everyone group. Using a symbolic link allows an attacker to point the log file to a privileged location such as %WINDIR%\System32. The resulting log file adopts the file permissions of the source of the symbolic link (in this case, the Everyone group). The log file in System32 can be replaced and renamed with a malicious DLL for DLL hijacking.
CVE-2021-27483 1 Zoll 1 Defibrillator Dashboard 2024-11-21 4.6 MEDIUM 7.8 HIGH
ZOLL Defibrillator Dashboard, v prior to 2.2,The affected products contain insecure filesystem permissions that could allow a lower privilege user to escalate privileges to an administrative level user.
CVE-2021-27445 1 Mesalabs 1 Amegaview 2024-11-21 4.6 MEDIUM 7.8 HIGH
Mesa Labs AmegaView Versions 3.0 and prior has insecure file permissions that could be exploited to escalate privileges on the device.
CVE-2021-27070 1 Microsoft 2 Windows 10, Windows Server 2016 2024-11-21 9.3 HIGH 7.3 HIGH
Windows 10 Update Assistant Elevation of Privilege Vulnerability
CVE-2021-26589 1 Hpe 4 Superdome Flex, Superdome Flex 280, Superdome Flex 280 Firmware and 1 more 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
A potential security vulnerability has been identified in HPE Superdome Flex Servers. The vulnerability could be remotely exploited to allow Cross Site Scripting (XSS) because the Session Cookie is missing an HttpOnly Attribute. HPE has provided a firmware update to resolve the vulnerability in HPE Superdome Flex Servers.
CVE-2021-26434 1 Microsoft 2 Visual Studio 2017, Visual Studio 2019 2024-11-21 7.2 HIGH 7.8 HIGH
Visual Studio Elevation of Privilege Vulnerability
CVE-2021-25393 1 Google 1 Android 2024-11-21 2.1 LOW 6.6 MEDIUM
Improper sanitization of incoming intent in SecSettings prior to SMR MAY-2021 Release 1 allows local attackers to get permissions to access system uid data.
CVE-2021-25318 1 Rancher 1 Rancher 2024-11-21 6.5 MEDIUM 8.8 HIGH
A Incorrect Permission Assignment for Critical Resource vulnerability in Rancher allows users in the cluster to modify resources they should not have access to. This issue affects: Rancher versions prior to 2.5.9 ; Rancher versions prior to 2.4.16.
CVE-2021-25276 1 Solarwinds 1 Serv-u 2024-11-21 3.6 LOW 7.1 HIGH
In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users' password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server's filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C:\ home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges.