Vulnerabilities (CVE)

Filtered by CWE-862
Total 3177 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-42473 1 Sap 1 S\/4hana 2024-11-21 N/A 5.4 MEDIUM
S/4HANA Manage (Withholding Tax Items) - version 106, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges which has low impact on the confidentiality and integrity of the application.
CVE-2023-42469 1 Fulldive 1 Full Dialer 2024-11-21 N/A 3.3 LOW
The com.full.dialer.top.secure.encrypted application through 1.0.1 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.full.dialer.top.secure.encrypted.activities.DialerActivity component.
CVE-2023-42358 1 O-ran-sc 1 Ric-plt-e2mgr 2024-11-21 N/A 7.7 HIGH
An issue was discovered in O-RAN Software Community ric-plt-e2mgr in the G-Release environment, allows remote attackers to cause a denial of service (DoS) via a crafted request to the E2Manager API component.
CVE-2023-41947 1 Jenkins 1 Frugal Testing 2024-11-21 N/A 4.3 MEDIUM
A missing permission check in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to Frugal Testing using attacker-specified credentials.
CVE-2023-41945 1 Jenkins 1 Assembla Auth 2024-11-21 N/A 8.8 HIGH
Jenkins Assembla Auth Plugin 1.14 and earlier does not verify that the permissions it grants are enabled, resulting in users with EDIT permissions to be granted Overall/Manage and Overall/SystemRead permissions, even if those permissions are disabled and should not be granted.
CVE-2023-41943 1 Jenkins 1 Aws Codecommit Trigger 2024-11-21 N/A 6.5 MEDIUM
Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to clear the SQS queue.
CVE-2023-41941 1 Jenkins 1 Aws Codecommit Trigger 2024-11-21 N/A 4.3 MEDIUM
A missing permission check in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins.
CVE-2023-41908 1 Cerebrate-project 1 Cerebrate 2024-11-21 N/A 5.3 MEDIUM
Cerebrate before 1.15 lacks the Secure attribute for the session cookie.
CVE-2023-41805 1 Brainstormforce 1 Starter Templates 2024-11-21 N/A 6.5 MEDIUM
Missing Authorization vulnerability in Brainstorm Force Premium Starter Templates, Brainstorm Force Starter Templates astra-sites.This issue affects Premium Starter Templates: from n/a through 3.2.5; Starter Templates: from n/a through 3.2.5.
CVE-2023-41750 4 Acronis, Apple, Linux and 1 more 4 Agent, Macos, Linux Kernel and 1 more 2024-11-21 N/A 5.5 MEDIUM
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 32047.
CVE-2023-41651 2024-11-21 N/A 6.5 MEDIUM
Missing Authorization vulnerability in Multi-column Tag Map.This issue affects Multi-column Tag Map: from n/a through 17.0.26.
CVE-2023-41296 1 Huawei 2 Emui, Harmonyos 2024-11-21 N/A 9.1 CRITICAL
Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality.
CVE-2023-41240 1 Varktech 1 Pricing Deals For Woocommerce 2024-11-21 N/A 5.3 MEDIUM
Missing Authorization vulnerability in Vark Pricing Deals for WooCommerce.This issue affects Pricing Deals for WooCommerce: from n/a through 2.0.3.2.
CVE-2023-41046 1 Xwiki 1 Xwiki 2024-11-21 N/A 6.3 MEDIUM
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible in XWiki to execute Velocity code without having script right by creating an XClass with a property of type "TextArea" and content type "VelocityCode" or "VelocityWiki". For the former, the syntax of the document needs to be set the `xwiki/1.0` (this syntax doesn't need to be installed). In both cases, when adding the property to an object, the Velocity code is executed regardless of the rights of the author of the property (edit right is still required, though). In both cases, the code is executed with the correct context author so no privileged APIs can be accessed. However, Velocity still grants access to otherwise inaccessible data and APIs that could allow further privilege escalation. At least for "VelocityCode", this behavior is most likely very old but only since XWiki 7.2, script right is a separate right, before that version all users were allowed to execute Velocity and thus this was expected and not a security issue. This has been patched in XWiki 14.10.10 and 15.4 RC1. Users are advised to upgrade. There are no known workarounds.
CVE-2023-40672 2024-11-21 N/A 5.4 MEDIUM
Missing Authorization vulnerability in Hardik Chavada Sticky Social Media Icons.This issue affects Sticky Social Media Icons: from n/a through 2.1.
CVE-2023-40654 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2024-11-21 N/A 6.7 MEDIUM
In FW-PackageManager, there is a possible missing permission check. This could lead to local escalation of privilege with System execution privileges needed
CVE-2023-40653 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2024-11-21 N/A 6.7 MEDIUM
In FW-PackageManager, there is a possible missing permission check. This could lead to local escalation of privilege with System execution privileges needed
CVE-2023-40650 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2024-11-21 N/A 5.5 MEDIUM
In Telecom service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
CVE-2023-40649 2 Google, Unisoc 2 Android, Sc9863a 2024-11-21 N/A 5.5 MEDIUM
In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
CVE-2023-40648 2 Google, Unisoc 2 Android, Sc9863a 2024-11-21 N/A 5.5 MEDIUM
In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed