Vulnerabilities (CVE)

Filtered by CWE-269
Total 2585 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-48341 1 Thingsboard 1 Thingsboard 2025-03-12 N/A 8.8 HIGH
ThingsBoard 3.4.1 could allow a remote authenticated attacker to achieve Vertical Privilege Escalation. A Tenant Administrator can obtain System Administrator dashboard access by modifying the scope via the scopes parameter.
CVE-2024-2297 1 Bricksbuilder 1 Bricks 2025-03-11 N/A 7.1 HIGH
The Bricks theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.6.1. This is due to insufficient validation checks placed on the create_autosave AJAX function. This makes it possible for authenticated attackers, with contributor-level access and above, to execute arbitrary PHP code with elevated (administrator-level) privileges. NOTE: Successful exploitation requires (1) the Bricks Builder to be enabled for posts (2) Builder access to be enabled for contributor-level users, and (3) "Code Execution" to be enabled for administrator-level users within the theme's settings.
CVE-2022-48284 1 Huawei 1 Hilink Ai Life 2025-03-11 N/A 9.8 CRITICAL
A piece of Huawei whole-home intelligence software has an Incorrect Privilege Assignment vulnerability. Successful exploitation of this vulnerability could allow attackers to access restricted functions.
CVE-2022-48283 1 Huawei 1 Hilink Ai Life 2025-03-11 N/A 9.8 CRITICAL
A piece of Huawei whole-home intelligence software has an Incorrect Privilege Assignment vulnerability. Successful exploitation of this vulnerability could allow attackers to access restricted functions.
CVE-2022-32949 1 Apple 3 Ipados, Iphone Os, Tvos 2025-03-11 N/A 7.8 HIGH
This issue was addressed with improved checks. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, tvOS 16. An app may be able to execute arbitrary code with kernel privileges.
CVE-2022-32900 1 Apple 1 Macos 2025-03-11 N/A 7.8 HIGH
A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6, macOS Big Sur 11.7. An app may be able to gain elevated privileges.
CVE-2025-21199 2025-03-11 N/A 6.7 MEDIUM
Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally.
CVE-2024-1442 1 Grafana 1 Grafana 2025-03-11 N/A 6.0 MEDIUM
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *. Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
CVE-2023-23497 1 Apple 1 Macos 2025-03-11 N/A 7.8 HIGH
A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.3, macOS Ventura 13.2, macOS Monterey 12.6.3. An app may be able to gain root privileges.
CVE-2025-26707 2025-03-11 N/A 5.3 MEDIUM
Improper Privilege Management vulnerability in ZTE GoldenDB allows Privilege Escalation.This issue affects GoldenDB: from 6.1.03 through 6.1.03.05.
CVE-2025-1121 2025-03-07 N/A 6.8 MEDIUM
Privilege escalation in Installer and Recovery image handling in Google ChromeOS 123.0.6312.112 on device allows an attacker with physical access to gain root code execution and potentially unenroll enterprise-managed devices via a specially crafted recovery image.
CVE-2023-34045 2 Apple, Vmware 2 Mac Os X, Fusion 2025-03-07 N/A 6.6 MEDIUM
VMware Fusion(13.x prior to 13.5) contains a local privilege escalation vulnerability that occurs during installation for the first time (the user needs to drag or copy the application to a folder from the '.dmg' volume) or when installing an upgrade. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed or being installed for the first time.
CVE-2023-26604 1 Systemd Project 1 Systemd 2025-03-07 N/A 7.8 HIGH
systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.
CVE-2022-45608 1 Thingsboard 1 Thingsboard 2025-03-07 N/A 8.8 HIGH
An issue was discovered in ThingsBoard 3.4.1, allows low privileged attackers (CUSTOMER_USER) to gain escalated privileges (vertically) and become an Administrator (TENANT_ADMIN) or (SYS_ADMIN) on the web application. It is important to note that in order to accomplish this, the attacker must know the corresponding API's parameter (authority : value).
CVE-2022-45988 1 Starsoftcomm 1 Coocare 2025-03-07 N/A 7.8 HIGH
starsoftcomm CooCare 5.304 allows local attackers to escalate privileges and execute arbitrary commands via a crafted file upload.
CVE-2024-8420 1 Sitesao 1 Dhvc Form 2025-03-06 N/A 9.8 CRITICAL
The DHVC Form plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.4.7. This is due to the plugin allowing a user to supply the 'role' field when registering. This makes it possible for unauthenticated attackers to register as an administrator on sites.
CVE-2023-34057 2 Apple, Vmware 2 Macos, Tools 2025-03-06 N/A 7.8 HIGH
VMware Tools contains a local privilege escalation vulnerability. A malicious actor with local user access to a guest virtual machine may elevate privileges within the virtual machine.
CVE-2023-26600 1 Zohocorp 4 Manageengine Assetexplorer, Manageengine Servicedesk Plus, Manageengine Servicedesk Plus Msp and 1 more 2025-03-06 N/A 6.5 MEDIUM
ManageEngine ServiceDesk Plus through 14104, ServiceDesk Plus MSP through 14000, Support Center Plus through 14000, and Asset Explorer through 6987 allow privilege escalation via query reports.
CVE-2023-25144 2 Microsoft, Trendmicro 2 Windows, Apex One 2025-03-06 N/A 7.8 HIGH
An improper access control vulnerability in the Trend Micro Apex One agent could allow a local attacker to gain elevated privileges and create arbitrary directories with arbitrary ownership.
CVE-2023-21376 1 Google 1 Android 2025-03-06 N/A 5.5 MEDIUM
In Telephony, there is a possible way to retrieve the ICCID due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.