Vulnerabilities (CVE)

Filtered by CWE-862
Total 2747 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-20133 1 Google 1 Android 2023-08-08 7.2 HIGH 7.8 HIGH
In setDiscoverableTimeout of AdapterService.java, there is a possible bypass of user interaction due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-206807679
CVE-2023-3426 1 Liferay 2 Digital Experience Platform, Liferay Portal 2023-08-05 N/A 4.3 MEDIUM
The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations.
CVE-2022-43712 1 Gxsoftware 1 Xperiencentral 2023-08-04 N/A 6.5 MEDIUM
POST requests to /web/mvc in GX Software XperienCentral version 10.36.0 and earlier were not blocked for uses that are not logged in. If an unauthorized user is able to bypass other security filters they are able to post unauthorized data to the server because of CVE-2022-22965.
CVE-2023-38989 1 Jeesite 1 Jeesite 2023-08-04 N/A 4.3 MEDIUM
An issue in the delete function in the UserController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete the Administrator's role information.
CVE-2023-3442 1 Jenkins 1 Servicenow Devops 2023-08-03 N/A 7.5 HIGH
A missing authorization vulnerability exists in versions of the Jenkins Plug-in for ServiceNow DevOps prior to 1.38.1 that, if exploited successfully, could cause the unwanted exposure of sensitive information. To address this issue, apply the 1.38.1 version of the Jenkins plug-in for ServiceNow DevOps on your Jenkins server. No changes are required on your instances of the Now Platform.
CVE-2023-38510 1 Tolgee 1 Tolgee 2023-08-03 N/A 8.1 HIGH
Tolgee is an open-source localization platform. Starting in version 3.14.0 and prior to version 3.23.1, when a request is made using an API key, the backend fails to verify the permission scopes associated with the key, effectively bypassing permission checks entirely for some endpoints. It's important to note that this vulnerability only affects projects that have inadvertently exposed their API keys on the internet. Projects that have kept their API keys secure are not impacted. This issue is fixed in version 3.23.1.
CVE-2022-0611 1 Snipeitapp 1 Snipe-it 2023-08-02 6.5 MEDIUM 8.8 HIGH
Missing Authorization in Packagist snipe/snipe-it prior to 5.3.11.
CVE-2022-0588 1 Librenms 1 Librenms 2023-08-02 4.0 MEDIUM 6.5 MEDIUM
Missing Authorization in Packagist librenms/librenms prior to 22.2.0.
CVE-2022-0579 1 Snipeitapp 1 Snipe-it 2023-08-02 4.0 MEDIUM 6.5 MEDIUM
Missing Authorization in Packagist snipe/snipe-it prior to 5.3.9.
CVE-2022-0178 1 Snipeitapp 1 Snipe-it 2023-08-02 5.5 MEDIUM 5.4 MEDIUM
Missing Authorization vulnerability in snipe snipe/snipe-it.This issue affects snipe/snipe-i before 5.3.8.
CVE-2023-37049 1 Emlog 1 Emlog 2023-07-31 N/A 6.5 MEDIUM
emlog 2.1.9 is vulnerable to Arbitrary file deletion via admin\template.php.
CVE-2023-26301 1 Hp 38 Color Laserjet Pro 4201-4203 4ra87f, Color Laserjet Pro 4201-4203 4ra87f Firmware, Color Laserjet Pro 4201-4203 4ra88f and 35 more 2023-07-31 N/A 9.8 CRITICAL
Certain HP LaserJet Pro print products are potentially vulnerable to an Elevation of Privilege and/or Information Disclosure related to a lack of authentication with certain endpoints.
CVE-2023-33265 1 Hazelcast 2 Hazelcast, Imdg 2023-07-28 N/A 8.8 HIGH
In Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, executor services don't check client permissions properly, allowing authenticated users to execute tasks on members without the required permissions granted.
CVE-2023-3072 1 Hashicorp 1 Nomad 2023-07-27 N/A 3.8 LOW
HashiCorp Nomad and Nomad Enterprise 0.7.0 up to 1.5.6 and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11.
CVE-2023-3587 1 Mattermost 1 Mattermost Server 2023-07-27 N/A 2.7 LOW
Mattermost fails to properly show information in the UI, allowing a system admin to modify a board state allowing any user with a valid sharing link to join the board with editor access, without the UI showing the updated permissions.
CVE-2023-3300 1 Hashicorp 1 Nomad 2023-07-27 N/A 5.3 MEDIUM
HashiCorp Nomad and Nomad Enterprise 0.11.0 up to 1.5.6 and 1.4.1 HTTP search API can reveal names of available CSI plugins to unauthenticated users or users without the plugin:read policy. Fixed in 1.6.0, 1.5.7, and 1.4.1.
CVE-2023-2268 1 Plane 1 Plane 2023-07-26 N/A 7.5 HIGH
Plane version 0.7.1 allows an unauthenticated attacker to view all stored server files of all users.
CVE-2023-21247 1 Google 1 Android 2023-07-25 N/A 7.8 HIGH
In getAvailabilityStatus of BluetoothScanningMainSwitchPreferenceController.java, there is a possible way to bypass a device policy restriction due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21248 1 Google 1 Android 2023-07-25 N/A 7.8 HIGH
In getAvailabilityStatus of WifiScanningMainSwitchPreferenceController.java, there is a possible way to bypass a device policy restriction due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2022-21707 1 Wasmcloud 1 Host Runtime 2023-07-24 5.5 MEDIUM 8.1 HIGH
wasmCloud Host Runtime is a server process that securely hosts and provides dispatch for web assembly (WASM) actors and capability providers. In versions prior to 0.52.2 actors can bypass capability authorization. Actors are normally required to declare their capabilities for inbound invocations, but with this vulnerability actor capability claims are not verified upon receiving invocations. This compromises the security model for actors as they can receive unauthorized invocations from linked capability providers. The problem has been patched in versions `0.52.2` and greater. There is no workaround and users are advised to upgrade to an unaffected version as soon as possible.