Vulnerabilities (CVE)

Filtered by CWE-862
Total 2747 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-24354 1 Wpdeveloper 1 Simple 301 Redirects 2022-05-03 6.5 MEDIUM 8.8 HIGH
A lack of capability checks and insufficient nonce check on the AJAX action in the Simple 301 Redirects by BetterLinks WordPress plugin before 2.0.4, made it possible for authenticated users to install arbitrary plugins on vulnerable sites.
CVE-2021-24184 1 Themeum 1 Tutor Lms 2022-05-03 6.5 MEDIUM 8.8 HIGH
Several AJAX endpoints in the Tutor LMS – eLearning and online course solution WordPress plugin before 1.7.7 were unprotected, allowing students to modify course information and elevate their privileges among many other actions.
CVE-2021-31921 1 Istio 1 Istio 2022-05-01 6.8 MEDIUM 9.8 CRITICAL
Istio before 1.8.6 and 1.9.x before 1.9.5 contains a remotely exploitable vulnerability where an external client can access unexpected services in the cluster, bypassing authorization checks, when a gateway is configured with AUTO_PASSTHROUGH routing configuration.
CVE-2020-0293 1 Google 1 Android 2022-04-28 2.1 LOW 5.5 MEDIUM
In Java network APIs, there is possible access to sensitive network state due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation in Android versions: Android-11, Android ID: A-141455849
CVE-2022-1384 1 Mattermost 1 Mattermost Server 2022-04-27 6.0 MEDIUM 8.8 HIGH
Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabilities.
CVE-2020-15780 3 Canonical, Linux, Opensuse 3 Ubuntu Linux, Linux Kernel, Leap 2022-04-27 7.2 HIGH 6.7 MEDIUM
An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
CVE-2022-1054 1 Wpchill 1 Rsvp And Event Management 2022-04-27 5.0 MEDIUM 5.3 MEDIUM
The RSVP and Event Management Plugin WordPress plugin before 2.7.8 does not have any authorisation checks when exporting its entries, and has the export function hooked to the init action. As a result, unauthenticated attackers could call it and retrieve PII such as first name, last name and email address of user registered for events
CVE-2019-19985 1 Icegram 1 Email Subscribers \& Newsletters 2022-04-26 5.0 MEDIUM 5.3 MEDIUM
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure.
CVE-2020-13144 1 Edx 1 Open Edx Platform 2022-04-26 6.5 MEDIUM 8.8 HIGH
Studio in Open edX Ironwood 2.5, when CodeJail is not used, allows a user to go to the "Create New course>New section>New subsection>New unit>Add new component>Problem button>Advanced tab>Custom Python evaluated code" screen, edit the problem, and execute Python code. This leads to arbitrary code execution.
CVE-2020-0454 1 Google 1 Android 2022-04-26 2.1 LOW 5.5 MEDIUM
In callCallbackForRequest of ConnectivityService.java, there is a possible permission bypass due to a missing permission check. This could lead to local information disclosure of the current SSID with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-161370134
CVE-2021-39225 1 Nextcloud 1 Deck 2022-04-25 5.5 MEDIUM 8.1 HIGH
Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading.
CVE-2017-18101 1 Atlassian 2 Jira, Jira Server 2022-04-22 6.4 MEDIUM 6.5 MEDIUM
Various administrative external system import resources in Atlassian JIRA Server (including JIRA Core) before version 7.6.5, from version 7.7.0 before version 7.7.3, from version 7.8.0 before version 7.8.3 and before version 7.9.0 allow remote attackers to run import operations and to determine if an internal service exists through missing permission checks.
CVE-2019-14995 1 Atlassian 1 Jira Server 2022-04-22 5.0 MEDIUM 5.3 MEDIUM
The /rest/api/1.0/render resource in Jira before version 8.4.0 allows remote anonymous attackers to determine if an attachment with a specific name exists and if an issue key is valid via a missing permissions check.
CVE-2020-10955 2 Debian, Gitlab 2 Debian Linux, Gitlab 2022-04-22 4.0 MEDIUM 6.5 MEDIUM
GitLab EE/CE 11.1 through 12.9 is vulnerable to parameter tampering on an upload feature that allows an unauthorized user to read content available under specific folders.
CVE-2022-27669 1 Sap 1 Netweaver Application Server For Java 2022-04-20 5.0 MEDIUM 7.5 HIGH
An unauthenticated user can use functions of XML Data Archiving Service of SAP NetWeaver Application Server for Java - version 7.50, to which access should be restricted. This may result in an escalation of privileges.
CVE-2017-12084 1 Meetcircle 2 Circle With Disney, Circle With Disney Firmware 2022-04-19 6.0 MEDIUM 6.6 MEDIUM
A backdoor vulnerability exists in remote control functionality of Circle with Disney running firmware 2.0.1. A specific set of network packets can remotely start an SSH server on the device, resulting in a persistent backdoor. An attacker can send an API call to enable the SSH server.
CVE-2022-0919 1 Salonbookingsystem 1 Salon Booking System 2022-04-15 5.0 MEDIUM 5.3 MEDIUM
The Salon booking system Free and pro WordPress plugins before 7.6.3 do not have proper authorisation when searching bookings, allowing any unauthenticated users to search other's booking, as well as retrieve sensitive information about the bookings, such as the full name, email and phone number of the person who booked it.
CVE-2019-12274 1 Suse 1 Rancher 2022-04-13 4.0 MEDIUM 8.8 HIGH
In Rancher 1 and 2 through 2.2.3, unprivileged users (if allowed to deploy nodes) can gain admin access to the Rancher management plane because node driver options intentionally allow posting certain data to the cloud. The problem is that a user could choose to post a sensitive file such as /root/.kube/config or /var/lib/rancher/management-state/cred/kubeconfig-system.yaml.
CVE-2021-25087 1 Wpdownloadmanager 1 Wordpress Download Manager 2022-04-12 5.0 MEDIUM 7.5 HIGH
The Download Manager WordPress plugin before 3.2.35 does not have any authorisation checks in some of the REST API endpoints, allowing unauthenticated attackers to call them, which could lead to sensitive information disclosure, such as posts passwords (fixed in 3.2.24) and files Master Keys (fixed in 3.2.25).
CVE-2022-23183 1 Advancedcustomfields 1 Advanced Custom Fields 2022-04-07 4.0 MEDIUM 6.5 MEDIUM
Missing authorization vulnerability in Advanced Custom Fields versions prior to 5.12.1 and Advanced Custom Fields Pro versions prior to 5.12.1 allows a remote authenticated attacker to view the information on the database without the access permission.