Vulnerabilities (CVE)

Filtered by CWE-862
Total 4572 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-36888 1 Jenkins 1 Hashicorp Vault 2023-11-22 N/A 6.5 MEDIUM
A missing permission check in Jenkins HashiCorp Vault Plugin 354.vdb_858fd6b_f48 and earlier allows attackers with Overall/Read permission to obtain credentials stored in Vault with attacker-specified path and keys.
CVE-2022-34798 1 Jenkins 1 Deployment Dashboard 2023-11-22 3.5 LOW 4.3 MEDIUM
Jenkins Deployment Dashboard Plugin 1.0.10 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP URL using attacker-specified credentials.
CVE-2022-34810 1 Jenkins 1 Rqm 2023-11-22 4.0 MEDIUM 6.5 MEDIUM
A missing check in Jenkins RQM Plugin 2.8 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2022-34811 1 Jenkins 1 Xpath Configuration Viewer 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to access the XPath Configuration Viewer page.
CVE-2022-34813 1 Jenkins 1 Xpath Configuration Viewer 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to create and delete XPath expressions.
CVE-2022-34818 1 Jenkins 1 Failed Job Deactivator 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier does not perform permission checks in several views and HTTP endpoints, allowing attackers with Overall/Read permission to disable jobs.
CVE-2022-34796 1 Jenkins 1 Deployment Dashboard 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2022-28139 1 Jenkins 1 Rocketchat Notifier 2023-11-17 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins RocketChat Notifier Plugin 1.4.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
CVE-2022-28147 1 Jenkins 1 Continuous Integration With Toad Edge 2023-11-17 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
CVE-2022-28144 1 Jenkins 1 Proxmox 2023-11-17 4.0 MEDIUM 6.5 MEDIUM
Jenkins Proxmox Plugin 0.7.0 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified host using attacker-specified username and password (perform a connection test), disable SSL/TLS validation for the entire Jenkins controller JVM as part of the connection test (see CVE-2022-28142), and test a rollback with attacker-specified parameters.
CVE-2023-6001 1 Yugabyte 1 Yugabytedb 2023-11-16 N/A 7.5 HIGH
Prometheus metrics are available without authentication. These expose detailed and sensitive information about the YugabyteDB Anywhere environment.
CVE-2023-43885 1 Tenda 2 Rx9 Pro, Rx9 Pro Firmware 2023-11-16 N/A 8.1 HIGH
Missing error handling in the HTTP server component of Tenda RX9 Pro Firmware V22.03.02.20 allows authenticated attackers to arbitrarily lock the device.
CVE-2020-7343 1 Mcafee 1 Agent 2023-11-16 2.1 LOW 5.5 MEDIUM
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2023-5506 1 Imagemapper Project 1 Imagemapper 2023-11-14 N/A 4.3 MEDIUM
The ImageMapper plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'imgmap_delete_area_ajax' function in versions up to, and including, 1.2.6. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts and pages.
CVE-2020-22176 1 Phpgurukul 1 Hospital Management System 2023-11-14 5.0 MEDIUM 7.5 HIGH
PHPGurukul Hospital Management System in PHP v4.0 has a sensitive information disclosure vulnerability in multiple areas. Remote unauthenticated users can exploit the vulnerability to obtain user sensitive information.
CVE-2023-26035 1 Zoneminder 1 Zoneminder 2023-11-14 N/A 9.8 CRITICAL
ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33.
CVE-2023-43194 1 Rcos 1 Submitty 2023-11-10 N/A 5.3 MEDIUM
Submitty before v22.06.00 is vulnerable to Incorrect Access Control. An attacker can delete any post in the forum by modifying request parameter.
CVE-2023-36621 1 Nationaledtech 1 Boomerang 2023-11-09 N/A 9.1 CRITICAL
An issue was discovered in the Boomerang Parental Control application through 13.83 for Android. The child can use Safe Mode to remove all restrictions temporarily or uninstall the application without the parents noticing.
CVE-2023-4198 1 Dolibarr 1 Dolibarr Erp\/crm 2023-11-08 N/A 6.5 MEDIUM
Improper Access Control in Dolibarr ERP CRM <= v17.0.3 allows an unauthorized authenticated user to read a database table containing customer data
CVE-2023-42631 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2023-11-08 N/A 5.5 MEDIUM
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed