Vulnerabilities (CVE)

Filtered by CWE-732
Total 1115 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-6506 1 Wpwhitesecurity 1 Wp 2fa 2024-02-05 N/A 4.3 MEDIUM
The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.5.0 via the send_backup_codes_email due to missing validation on a user controlled key. This makes it possible for subscriber-level attackers to email arbitrary users on the site.
CVE-2023-29065 2 Bd, Hp 3 Facschorus, Hp Z2 Tower G5, Hp Z2 Tower G9 2024-02-05 N/A 4.3 MEDIUM
The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.
CVE-2023-46141 1 Phoenixcontact 31 Automationworx Software Suite, Axc 1050, Axc 1050 Firmware and 28 more 2024-02-05 N/A 9.8 CRITICAL
Incorrect Permission Assignment for Critical Resource vulnerability in multiple products of the PHOENIX CONTACT classic line allow an remote unauthenticated attacker to gain full access of the affected device.
CVE-2023-49946 1 Forgejo 1 Forgejo 2024-02-05 N/A 9.1 CRITICAL
In Forgejo before 1.20.5-1, certain endpoints do not check whether an object belongs to a repository for which permissions are being checked. This allows remote attackers to read private issues, read private pull requests, delete issues, and perform other unauthorized actions.
CVE-2023-40302 1 Netscout 1 Ngeniuspulse 2024-02-05 N/A 9.1 CRITICAL
NETSCOUT nGeniusPULSE 3.8 has Weak File Permissions Vulnerability
CVE-2023-38541 1 Intel 1 Hid Event Filter Driver 2024-02-05 N/A 7.8 HIGH
Insecure inherited permissions in some Intel HID Event Filter drivers for Windows 10 for some Intel NUC laptop software installers before version 2.2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-52116 1 Huawei 2 Emui, Harmonyos 2024-02-05 N/A 7.5 HIGH
Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device.
CVE-2023-0757 1 Phoenixcontact 2 Multiprog, Proconos Eclr 2024-02-05 N/A 9.8 CRITICAL
Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to upload arbitrary malicious code and gain full access on the affected device.
CVE-2023-6883 1 Easysocialfeed 1 Easy Social Feed 2024-02-05 N/A 4.3 MEDIUM
The Easy Social Feed plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in all versions up to, and including, 6.5.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform unauthorized actions, such as modifying the plugin's Facebook and Instagram access tokens and updating group IDs.
CVE-2023-50446 1 Mullvad 1 Mullvad Vpn 2024-02-05 N/A 7.8 HIGH
An issue was discovered in Mullvad VPN Windows app before 2023.6-beta1. Insufficient permissions on a directory allow any local unprivileged user to escalate privileges to SYSTEM.
CVE-2023-42924 1 Apple 1 Macos 2024-02-05 N/A 5.5 MEDIUM
A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.2, macOS Ventura 13.6.3. An app may be able to access sensitive user data.
CVE-2022-33898 1 Intel 1 Nuc Watchdog Timer Utility 2024-02-05 N/A 7.8 HIGH
Insecure inherited permissions in some Intel(R) NUC Watchdog Timer installation software before version 2.0.21.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-46142 1 Phoenixcontact 17 Axc F 1152, Axc F 1152 Firmware, Axc F 2152 and 14 more 2024-02-05 N/A 8.8 HIGH
A incorrect permission assignment for critical resource vulnerability in PLCnext products allows an remote attacker with low privileges to gain full access on the affected devices.
CVE-2023-20216 1 Cisco 12 Broadworks Application Delivery Platform, Broadworks Application Server, Broadworks Database Server and 9 more 2024-02-05 N/A 7.8 HIGH
A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system. This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions. There are workarounds that address this vulnerability.
CVE-2023-32723 1 Zabbix 1 Zabbix 2024-02-05 N/A 9.1 CRITICAL
Request to LDAP is sent before user permissions are checked.
CVE-2022-39062 1 Siemens 1 Sicam Toolbox Ii 2024-02-05 N/A 7.8 HIGH
A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.10). Affected applications do not properly set permissions for product folders. This could allow an authenticated attacker with low privileges to replace DLLs and conduct a privilege escalation.
CVE-2023-28658 1 Intel 1 Oneapi Math Kernel Library 2024-02-05 N/A 7.8 HIGH
Insecure inherited permissions in some Intel(R) oneMKL software before version 2022.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-32005 1 Nodejs 1 Node.js 2024-02-05 N/A 5.3 MEDIUM
A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument. This flaw arises from an inadequate permission model that fails to restrict file stats through the `fs.statfs` API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
CVE-2023-39005 1 Opnsense 1 Opnsense 2024-02-05 N/A 7.5 HIGH
Insecure permissions exist for configd.socket in OPNsense before 23.7.
CVE-2023-38991 1 Jeesite 1 Jeesite 2024-02-05 N/A 5.4 MEDIUM
An issue in the delete function in the ActModelController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete models created by the Administrator.