Filtered by CWE-284
Total 3975 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-3270 1 Thingsboard 1 Thingsboard 2025-02-07 3.8 Low
A vulnerability classified as problematic was found in ThingsBoard up to 3.6.2. This vulnerability affects unknown code of the component AdvancedFeature. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259282 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure and replied to be planning to fix this issue in version 3.7.
CVE-2024-33898 1 Axiros 1 Axess 2025-02-06 9.8 Critical
Axiros AXESS Auto Configuration Server (ACS) 4.x and 5.0.0 is affected by an Incorrect Access Control vulnerability. An authorization bypass allows remote attackers to achieve unauthenticated remote code execution.
CVE-2023-2104 1 Easyappointments 1 Easyappointments 2025-02-06 5.4 Medium
Improper Access Control in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
CVE-2024-47758 1 Glpi-project 1 Glpi 2025-02-06 8.8 High
GLPI is a free asset and IT management software package. Starting in version 9.3.0 and prior to version 10.0.17, an authenticated user can use the API to take control of any user that have the same or a lower level of privileges. Version 10.0.17 contains a patch for this issue.
CVE-2022-36789 1 Intel 52 Nuc 10 Performance Kit Nuc10i3fnh, Nuc 10 Performance Kit Nuc10i3fnh Firmware, Nuc 10 Performance Kit Nuc10i3fnhf and 49 more 2025-02-05 7.5 High
Improper access control in BIOS firmware for some Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version FNCML357.0053 may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2023-29513 1 Xwiki 1 Xwiki 2025-02-05 5 Medium
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. If guest has view right on any document. It's possible to create a new user using the `distribution/firstadminuser.wiki` in the wrong context. This vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.1. There is no known workaround other than upgrading.
CVE-2023-30539 1 Nextcloud 2 Nextcloud Files Automated Tagging, Nextcloud Server 2025-02-05 6.5 Medium
Nextcloud is a personal home server system. Depending on the set up tags and other workflows this issue can be used to limit access of others or being able to grant them access when there are system tag based files access control or files retention rules. It is recommended that the Nextcloud Server is upgraded to 24.0.11 or 25.0.5, the Nextcloud Enterprise Server to 21.0.9.11, 22.2.10.11, 23.0.12.6, 24.0.11 or 25.0.5, and the Nextcloud Files automated tagging app to 1.11.1, 1.12.1, 1.13.1, 1.14.2, 1.15.3 or 1.16.1. Users unable to upgrade should disable all workflow related apps. Users are advised to upgrade.
CVE-2023-52164 2025-02-05 5.1 Medium
access_device.cgi on Digiever DS-2105 Pro 3.1.0.71-11 devices allows arbitrary file read. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2023-29924 1 Powerjob 1 Powerjob 2025-02-05 9.8 Critical
PowerJob V4.3.1 is vulnerable to Incorrect Access Control that allows for remote code execution.
CVE-2023-29922 1 Powerjob 1 Powerjob 2025-02-05 5.3 Medium
PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create user/save interface.
CVE-2023-29921 1 Powerjob 1 Powerjob 2025-02-05 5.3 Medium
PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create app interface.
CVE-2023-29586 1 Codesector 1 Teracopy 2025-02-05 5.5 Medium
Code Sector TeraCopy 3.9.7 does not perform proper access validation on the source folder during a copy operation. This leads to Arbitrary File Read by allowing any user to copy any directory in the system to a directory they control. NOTE: the Supplier disputes this because only admin users can copy arbitrary folders, and because the 143984 reference is about a different concern (unrelated to directory copying) that was fixed in 3.5b.
CVE-2022-35276 1 Intel 10 Nuc 8 Compute Element Cm8ccb, Nuc 8 Compute Element Cm8ccb Firmware, Nuc 8 Compute Element Cm8i3cb and 7 more 2025-02-05 7.5 High
Improper access control in BIOS firmware for some Intel(R) NUC 8 Compute Elements before version CBWHL357.0096 may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2023-2202 1 Rosariosis 1 Rosariosis 2025-02-04 6.5 Medium
Improper Access Control in GitHub repository francoisjacquet/rosariosis prior to 10.9.3.
CVE-2024-36488 1 Intel 2 Driver \& Support Assistant, Dsa Software 2025-02-04 7.3 High
Improper Access Control in some Intel(R) DSA before version 24.3.26.8 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-43489 1 Intel 1 Computing Improvement Program 2025-02-04 5.5 Medium
Improper access control for some Intel(R) CIP software before version 2.4.10717 may allow an authenticated user to potentially enable denial of service via local access.
CVE-2024-22459 1 Dell 1 Elastic Cloud Storage 2025-02-04 6.8 Medium
Dell ECS, versions 3.6 through 3.6.2.5, and 3.7 through 3.7.0.6, and 3.8 through 3.8.0.4 versions, contain an improper access control vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to unauthorized access to all buckets and their data within a namespace
CVE-2024-49600 1 Dell 1 Power Manager 2025-02-04 7.8 High
Dell Power Manager (DPM), versions prior to 3.17, contain an improper access control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution and Elevation of Privileges.
CVE-2024-24902 1 Dell 1 Recoverpoint For Virtual Machines 2025-02-04 6.6 Medium
Dell RecoverPoint for Virtual Machines 6.0.x contains an Improper access control vulnerability. A low privileged local attacker could potentially exploit this vulnerability leading to gaining access to unauthorized data for a limited time.
CVE-2023-24512 1 Arista 110 32qd, 48ehs, 48lbas and 107 more 2025-02-03 8.8 High
On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision