Vulnerabilities (CVE)

Filtered by CWE-280
Total 65 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-3931 2025-05-16 N/A 7.8 HIGH
A flaw was found in Yggdrasil, which acts as a system broker, allowing the processes to communicate to other children's "worker" processes through the DBus component. Yggdrasil creates a DBus method to dispatch messages to workers. However, it misses authentication and authorization checks, allowing every system user to call it. One available Yggdrasil worker acts as a package manager with capabilities to create and enable new repositories and install or remove packages. This flaw allows an attacker with access to the system to leverage the lack of authentication on the dispatch message to force the Yggdrasil worker to install arbitrary RPM packages. This issue results in local privilege escalation, enabling the attacker to access and modify sensitive system data.
CVE-2025-30453 2025-05-13 N/A 7.8 HIGH
The issue was addressed with additional permissions checks. This issue is fixed in macOS Sequoia 15.4, macOS Ventura 13.7.6, macOS Sonoma 14.7.6. A malicious app may be able to gain root privileges.
CVE-2025-29826 2025-05-13 N/A 7.3 HIGH
Improper handling of insufficient permissions or privileges in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network.
CVE-2025-46740 2025-05-12 N/A 7.5 HIGH
An authenticated user without user administrative permissions could change the administrator Account Name.
CVE-2025-46584 1 Huawei 1 Harmonyos 2025-05-09 N/A 7.8 HIGH
Vulnerability of improper authentication logic implementation in the file system module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-31173 1 Huawei 1 Harmonyos 2025-05-07 N/A 8.8 HIGH
Memory write permission bypass vulnerability in the kernel futex module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-31172 1 Huawei 1 Harmonyos 2025-05-07 N/A 7.8 HIGH
Memory write permission bypass vulnerability in the kernel futex module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-20649 2 Mediatek, Openwrt 11 Mt6880, Mt6890, Mt6980 and 8 more 2025-04-22 N/A 6.5 MEDIUM
In Bluetooth Stack SW, there is a possible information disclosure due to a missing permission check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00396437; Issue ID: MSV-2184.
CVE-2024-22078 1 Elspec-ltd 2 G5dfr, G5dfr Firmware 2025-04-16 N/A 8.8 HIGH
An issue was discovered in Elspec G5 digital fault recorder versions 1.1.4.15 and before. Privilege escalation can occur via world writable files. The network configuration script has weak filesystem permissions. This results in write access for all authenticated users and the possibility to escalate from user privileges to administrative privileges.
CVE-2024-22077 1 Elspec-ltd 2 G5dfr, G5dfr Firmware 2025-04-16 N/A 5.3 MEDIUM
An issue was discovered in Elspec G5 digital fault recorder versions 1.1.4.15 and before. The SQLite database file has weak permissions.
CVE-2025-0468 2025-04-07 N/A 7.1 HIGH
Software installed and run as a non-privileged user may conduct improper GPU system calls to subvert GPU HW to write to arbitrary physical memory pages. Under certain circumstances this exploit could be used to corrupt data pages not allocated by the GPU driver but memory pages in use by the kernel and drivers running on the platform altering their behaviour.
CVE-2024-1608 1 Oppo 1 Usercenter Credit Software Development Kit 2025-04-02 N/A 9.1 CRITICAL
In OPPO Usercenter Credit SDK, there's a possible escalation of privilege due to loose permission check, This could lead to application internal information leak w/o user interaction.
CVE-2024-25844 2025-03-27 N/A 7.5 HIGH
An issue was discovered in Common-Services "So Flexibilite" (soflexibilite) module for PrestaShop before version 4.1.26, allows remote attackers to escalate privileges and obtain sensitive information via debug file.
CVE-2024-8315 2025-03-27 N/A N/A
An Improper Handling of Insufficient Permissions or Privileges vulnerability in scripts used in B&R APROL <4.4-00P5 may allow an authenticated local attacker to read credential information.
CVE-2024-55604 2025-03-27 N/A N/A
Appsmith is a platform to build admin panels, internal tools, and dashboards. Users invited as "App Viewer" should not have access to development information of a workspace. Datasources are such a component in a workspace. Yet, in versions of Appsmith prior to 1.51, app viewers are able to get a list of datasources in a workspace they're a member of. This information disclosure does NOT expose sensitive data in the datasources, such as database passwords and API Keys. The attacker needs to have been invited to a workspace as a "viewer", by someone in that workspace with access to invite. The attacker then needs to be able to signup/login to that Appsmith instance. The issue is patched in version 1.51. No known workarounds are available.
CVE-2025-0478 2025-03-27 N/A 7.8 HIGH
Software installed and run as a non-privileged user may conduct improper GPU system calls to issue reads and writes to arbitrary physical memory pages. Under certain circumstances this exploit could be used to corrupt data pages not allocated by the GPU driver but memory pages in use by the kernel and drivers running on the platform, altering their behaviour.
CVE-2024-51459 2025-03-19 N/A 8.4 HIGH
IBM InfoSphere Information Server 11.7 could allow a local user to execute privileged commands due to the improper handling of permissions.
CVE-2024-0015 1 Google 1 Android 2025-03-14 N/A 7.8 HIGH
In convertToComponentName of DreamService.java, there is a possible way to launch arbitrary protected activities due to intent redirection. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-52537 1 Huawei 2 Emui, Harmonyos 2025-03-13 N/A 7.5 HIGH
Vulnerability of package name verification being bypassed in the HwIms module. Impact: Successful exploitation of this vulnerability will affect availability.
CVE-2024-30418 1 Huawei 2 Emui, Harmonyos 2025-03-13 N/A 7.5 HIGH
Vulnerability of insufficient permission verification in the app management module. Impact: Successful exploitation of this vulnerability will affect availability.