Filtered by CWE-284
Total 3776 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-31199 1 Intel 1 Solid State Drive Toolbox 2025-01-24 7.1 High
Improper access control in the Intel(R) Solid State Drive Toolbox(TM) before version 3.4.5 may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2023-30768 1 Intel 128 Server Board S1200btl, Server Board S1200btl Firmware, Server Board S1200btlr and 125 more 2025-01-24 7.1 High
Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2023-2674 1 Open-emr 1 Openemr 2025-01-24 4.3 Medium
Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.
CVE-2024-47760 1 Glpi-project 1 Glpi 2025-01-23 8.8 High
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.17, a technician with an access to the API can take control of an account with higher privileges. Version 10.0.17 contains a patch for this issue.
CVE-2024-2481 1 Surya2developer 1 Hostel Management System 2025-01-23 6.5 Medium
A vulnerability, which was classified as critical, was found in Surya2Developer Hostel Management System 1.0. Affected is an unknown function of the file /admin/manage-students.php. The manipulation of the argument del leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-256890 is the identifier assigned to this vulnerability.
CVE-2023-23445 1 Sick 14 Ftmg-esd15axx, Ftmg-esd15axx Firmware, Ftmg-esd20axx and 11 more 2025-01-23 7.5 High
Improper Access Control in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows an unprivileged remote attacker to gain unauthorized access to data fields by using a therefore unpriviledged account via the REST interface.
CVE-2023-23446 1 Sick 14 Ftmg-esd15axx, Ftmg-esd15axx Firmware, Ftmg-esd20axx and 11 more 2025-01-23 7.5 High
Improper Access Control in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows an unprivileged remote attacker to download files by using a therefore unpriviledged account via the REST interface.
CVE-2023-43748 1 Intel 2 Graphics Performance Analyzer, Graphics Performance Analyzers Framework 2025-01-23 7.8 High
Improper access control in some Intel(R) GPA Framework software installers before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-40071 1 Intel 1 Graphics Performance Analyzers 2025-01-23 7.3 High
Improper access control in some Intel(R) GPA software installers before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-38205 1 Adobe 1 Coldfusion 2025-01-23 7.5 High
Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.
CVE-2024-10393 1 Themeum 1 Tutor Lms 2025-01-23 5.3 Medium
The Tutor LMS plugin for WordPress is vulnerable to bypass to user registration in versions up to, and including, 2.7.6. This is due to a missing check for the 'users_can_register' option in the 'register_instructor' function. This makes it possible for unauthenticated attackers to register as the default role on the site, even if registration is disabled.
CVE-2023-39244 1 Dell 1 Enterprise Storage Integrator For Sap Landscape Management 2025-01-23 7.3 High
DELL ESI (Enterprise Storage Integrator) for SAP LAMA, version 10.0, contains an information disclosure vulnerability in EHAC component. An remote unauthenticated attacker could potentially exploit this vulnerability by eavesdropping the network traffic to gain admin level credentials.
CVE-2024-25980 2 Fedoraproject, Moodle 2 Fedora, Moodle 2025-01-23 4.3 Medium
Separate Groups mode restrictions were not honored in the H5P attempts report, which would display users from other groups. By default this only provided additional access to non-editing teachers.
CVE-2024-25981 2 Fedoraproject, Moodle 2 Fedora, Moodle 2025-01-23 4.3 Medium
Separate Groups mode restrictions were not honored when performing a forum export, which would export forum data for all groups. By default this only provided additional access to non-editing teachers.
CVE-2023-28312 1 Microsoft 1 Azure Machine Learning 2025-01-23 6.5 Medium
Azure Machine Learning Information Disclosure Vulnerability
CVE-2023-28246 1 Microsoft 3 Windows 11 21h2, Windows 11 22h2, Windows Server 2022 2025-01-23 7.8 High
Windows Registry Elevation of Privilege Vulnerability
CVE-2023-28300 1 Microsoft 1 Azure Service Connector 2025-01-23 7.5 High
Azure Service Connector Security Feature Bypass Vulnerability
CVE-2024-51734 1 Zope 1 Accesscontrol 2025-01-22 N/A
Zope AccessControl provides a general security framework for use in Zope. In affected versions anonymous users can delete the user data maintained by an `AccessControl.userfolder.UserFolder` which may prevent any privileged access. This problem has been fixed in version 7.2. Users are advised to upgrade. Users unable to upgrade may address the issue by adding `data__roles__ = ()` to `AccessControl.userfolder.UserFolder`.
CVE-2025-0206 1 Code-projects 1 Online Shoe Store 2025-01-22 5.3 Medium
A vulnerability classified as critical was found in code-projects Online Shoe Store 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/index.php. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-0795 1 Mintplexlabs 1 Anythingllm 2025-01-21 7.2 High
If an attacked was given access to an instance with the admin or manager role there is no backend authentication that would prevent the attacked from creating a new user with an `admin` role and then be able to use this new account to have elevated privileges on the instance