Vulnerabilities (CVE)

Filtered by CWE-862
Total 2641 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-38438 2 Google, Unisoc 9 Android, Sc7731e, Sc9832e and 6 more 2023-09-07 N/A 5.5 MEDIUM
In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges
CVE-2023-38437 2 Google, Unisoc 9 Android, Sc7731e, Sc9832e and 6 more 2023-09-07 N/A 5.5 MEDIUM
In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges
CVE-2023-38436 2 Google, Unisoc 9 Android, Sc7731e, Sc9832e and 6 more 2023-09-07 N/A 5.5 MEDIUM
In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges
CVE-2023-33918 2 Google, Unisoc 9 Android, Sc7731e, Sc9832e and 6 more 2023-09-07 N/A 5.5 MEDIUM
In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges
CVE-2023-33917 2 Google, Unisoc 9 Android, Sc7731e, Sc9832e and 6 more 2023-09-07 N/A 5.5 MEDIUM
In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges
CVE-2023-33916 2 Google, Unisoc 9 Android, Sc7731e, Sc9832e and 6 more 2023-09-07 N/A 5.5 MEDIUM
In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges
CVE-2023-23763 1 Github 1 Enterprise Server 2023-09-07 N/A 5.3 MEDIUM
An authorization/sensitive information disclosure vulnerability was identified in GitHub Enterprise Server that allowed a fork to retain read access to an upstream repository after its visibility was changed to private. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.10.0 and was fixed in versions 3.9.4, 3.8.9, 3.7.16 and 3.6.18. This vulnerability was reported via the GitHub Bug Bounty program.
CVE-2023-41046 1 Xwiki 1 Xwiki 2023-09-07 N/A 6.3 MEDIUM
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible in XWiki to execute Velocity code without having script right by creating an XClass with a property of type "TextArea" and content type "VelocityCode" or "VelocityWiki". For the former, the syntax of the document needs to be set the `xwiki/1.0` (this syntax doesn't need to be installed). In both cases, when adding the property to an object, the Velocity code is executed regardless of the rights of the author of the property (edit right is still required, though). In both cases, the code is executed with the correct context author so no privileged APIs can be accessed. However, Velocity still grants access to otherwise inaccessible data and APIs that could allow further privilege escalation. At least for "VelocityCode", this behavior is most likely very old but only since XWiki 7.2, script right is a separate right, before that version all users were allowed to execute Velocity and thus this was expected and not a security issue. This has been patched in XWiki 14.10.10 and 15.4 RC1. Users are advised to upgrade. There are no known workarounds.
CVE-2023-20825 2 Google, Mediatek 46 Android, Mt2713, Mt6580 and 43 more 2023-09-07 N/A 5.5 MEDIUM
In duraspeed, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07951402; Issue ID: ALPS07951413.
CVE-2023-20826 2 Google, Mediatek 27 Android, Mt6580, Mt6761 and 24 more 2023-09-07 N/A 5.5 MEDIUM
In cta, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07978550; Issue ID: ALPS07978550.
CVE-2023-20833 2 Google, Mediatek 56 Android, Mt6580, Mt6731 and 53 more 2023-09-07 N/A 4.4 MEDIUM
In keyinstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS08017764.
CVE-2023-20824 2 Google, Mediatek 46 Android, Mt2713, Mt6580 and 43 more 2023-09-07 N/A 5.5 MEDIUM
In duraspeed, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07951402; Issue ID: ALPS07951402.
CVE-2023-41750 4 Acronis, Apple, Linux and 1 more 4 Agent, Macos, Linux Kernel and 1 more 2023-09-06 N/A 5.5 MEDIUM
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 32047.
CVE-2021-44795 1 Krontech 1 Single Connect 2023-09-03 5.0 MEDIUM 5.3 MEDIUM
Single Connect does not perform an authorization check when using the "sc-assigned-credential-ui" module. A remote attacker could exploit this vulnerability to modify users permissions. The exploitation of this vulnerability might allow a remote attacker to delete permissions from other users without authenticating.
CVE-2021-44794 1 Krontech 1 Single Connect 2023-09-03 5.0 MEDIUM 5.3 MEDIUM
Single Connect does not perform an authorization check when using the "sc-diagnostic-ui" module. A remote attacker could exploit this vulnerability to access the device information page. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.
CVE-2021-44793 1 Krontech 1 Single Connect 2023-09-03 5.0 MEDIUM 8.6 HIGH
Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials.
CVE-2021-44792 1 Krontech 1 Single Connect 2023-09-03 5.0 MEDIUM 5.3 MEDIUM
Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.
CVE-2023-40530 1 Skylark 1 Skylark 2023-08-31 N/A 4.7 MEDIUM
Improper authorization in handler for custom URL scheme issue in 'Skylark' App for Android 6.2.13 and earlier and 'Skylark' App for iOS 6.2.13 and earlier allows an attacker to lead a user to access an arbitrary website via another application installed on the user's device.
CVE-2021-24831 1 Rich-web 1 Tab 2023-08-31 5.0 MEDIUM 7.5 HIGH
All AJAX actions of the Tab WordPress plugin before 1.3.2 are available to both unauthenticated and authenticated users, allowing unauthenticated attackers to modify various data in the plugin, such as add/edit/delete arbitrary tabs.
CVE-2023-38508 1 Enalean 1 Tuleap 2023-08-30 N/A 4.3 MEDIUM
Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, the preview of an artifact link with a type does not respect the project, tracker and artifact level permissions. The issue occurs on the artifact view (not reproducible on the artifact modal). Users might get access to information they should not have access to. Only the title, status, assigned to and last update date fields as defined by the semantics are impacted. If those fields have strict permissions (e.g. the title is only visible to a specific user group) those permissions are still enforced. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue.