Vulnerabilities (CVE)

Filtered by CWE-863
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-1796 1 Huawei 4 Mate 20, Mate 20 Firmware, Mate 30 Pro and 1 more 2020-03-24 4.6 MEDIUM 6.6 MEDIUM
There is an improper authorization vulnerability in several smartphones. The software incorrectly performs an authorization to certain user, successful exploit could allow a low privilege user to do certain operation which the user are supposed not to do.Affected product versions include:HUAWEI Mate 20 versions Versions earlier than 10.0.0.188(C00E74R3P8);HUAWEI Mate 30 Pro versions Versions earlier than 10.0.0.203(C00E202R7P2).
CVE-2020-5240 1 Labdigital 1 Wagtail-2fa 2020-03-18 5.5 MEDIUM 8.5 HIGH
In wagtail-2fa before 1.4.1, any user with access to the CMS can view and delete other users 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other users device they can disable the target users 2FA devices and potentially compromise the account if they figure out their password. The problem has been patched in version 1.4.1.
CVE-2020-2104 1 Jenkins 1 Jenkins 2020-03-17 4.0 MEDIUM 4.3 MEDIUM
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier allowed users with Overall/Read access to view a JVM memory usage chart.
CVE-2019-13001 1 Gitlab 1 Gitlab 2020-03-10 4.0 MEDIUM 4.3 MEDIUM
An issue was discovered in GitLab Community and Enterprise Edition 11.9 and later through 12.0.2. GitLab Snippets were vulnerable to an authorization issue that allowed unauthorized users to add comments to a private snippet. It allows authentication bypass.
CVE-2020-2135 1 Jenkins 1 Script Security 2020-03-10 6.5 MEDIUM 8.8 HIGH
Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted method calls on objects that implement GroovyInterceptable.
CVE-2020-2134 1 Jenkins 1 Script Security 2020-03-10 6.5 MEDIUM 8.8 HIGH
Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted constructor calls and crafted constructor bodies.
CVE-2020-2148 1 Jenkins 1 Mac 2020-03-09 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Mac Plugin 1.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials.
CVE-2020-5251 1 Parseplatform 1 Parse-server 2020-03-06 5.0 MEDIUM 5.3 MEDIUM
In parser-server before version 4.1.0, you can fetch all the users objects, by using regex in the NoSQL query. Using the NoSQL, you can use a regex on sessionToken and find valid accounts this way.
CVE-2020-7251 1 Mcafee 1 Endpoint Security 2020-02-27 2.1 LOW 5.5 MEDIUM
Improper access control vulnerability in Configuration Tool in McAfee Mcafee Endpoint Security (ENS) Prior to 10.6.1 February 2020 Update allows local users to disable security features via unauthorised use of the configuration tool from older versions of ENS.
CVE-2013-4228 1 Organic Groups Project 1 Organic Groups 2020-02-26 4.0 MEDIUM 4.3 MEDIUM
The OG access fields (visibility fields) implementation in Organic Groups (OG) module 7.x-2.x before 7.x-2.3 for Drupal does not properly restrict access to private groups, which allows remote authenticated users to guess node IDs, subscribe to, and read the content of arbitrary private groups via unspecified vectors.
CVE-2014-7914 1 Google 1 Android 2020-02-26 5.8 MEDIUM 8.1 HIGH
btif/src/btif_dm.c in Android before 5.1 does not properly enforce the temporary nature of a Bluetooth pairing, which allows user-assisted remote attackers to bypass intended access restrictions via crafted Bluetooth packets after the tapping of a crafted NFC tag.
CVE-2020-5242 1 Openhab 1 Openhab 2020-02-26 9.3 HIGH 8.8 HIGH
openHAB before 2.5.2 allow a remote attacker to use REST calls to install the EXEC binding or EXEC transformation service and execute arbitrary commands on the system with the privileges of the user running openHAB. Starting with version 2.5.2 all commands need to be whitelisted in a local file which cannot be changed via REST calls.
CVE-2020-8119 1 Nextcloud 1 Nextcloud Server 2020-02-16 4.0 MEDIUM 4.3 MEDIUM
Improper authorization in Nextcloud server 17.0.0 causes leaking of previews and files when a file-drop share link is opened via the gallery app.
CVE-2013-2198 1 Login Security Project 1 Login Security 2020-02-13 7.5 HIGH 9.8 CRITICAL
The Login Security module 6.x-1.x before 6.x-1.3 and 7.x-1.x before 7.x-1.3 for Drupal allows attackers to bypass intended restrictions via a crafted username.
CVE-2020-5318 1 Dell 1 Emc Isilon Onefs 2020-02-11 5.0 MEDIUM 7.5 HIGH
Dell EMC Isilon OneFS versions 8.1.2, 8.1.0.4, 8.1.0.3, and 8.0.0.7 contain a vulnerability in some configurations. An attacker may exploit this vulnerability to gain access to restricted files. The non-RAN HTTP and WebDAV file-serving components have a vulnerability wherein when either are enabled, and Basic Authentication is enabled for either or both components, files are accessible without authentication.
CVE-2020-5232 1 Ens.domains 1 Ethereum Name Service 2020-02-06 4.9 MEDIUM 8.7 HIGH
A user who owns an ENS domain can set a trapdoor, allowing them to transfer ownership to another user, and later regain ownership without the new owners consent or awareness. A new ENS deployment is being rolled out that fixes this vulnerability in the ENS registry.
CVE-2013-2673 1 Brother 2 Mfc-9970cdw, Mfc-9970cdw Firmware 2020-02-05 4.6 MEDIUM 6.8 MEDIUM
Brother MFC-9970CDW 1.10 firmware L devices contain a security bypass vulnerability which allows physically proximate attackers to gain unauthorized access.
CVE-2020-8086 2 Debian, Prosody 3 Debian Linux, Mod Auth Ldap, Mod Auth Ldap2 2020-02-04 6.8 MEDIUM 9.8 CRITICAL
The mod_auth_ldap and mod_auth_ldap2 Community Modules through 2020-01-27 for Prosody incompletely verify the XMPP address passed to the is_admin() function. This grants remote entities admin-only functionality if their username matches the username of a local admin.
CVE-2013-2574 1 Foscam 2 Fi8620, Fi8620 Firmware 2020-02-04 5.0 MEDIUM 7.5 HIGH
An Access vulnerability exists in FOSCAM IP Camera FI8620 due to insufficient access restrictions in the /tmpfs/ and /log/ directories, which could let a malicious user obtain sensitive information.
CVE-2013-4862 1 Micasaverde 2 Veralite, Veralite Firmware 2020-02-04 5.5 MEDIUM 8.1 HIGH
MiCasaVerde VeraLite with firmware 1.5.408 does not properly restrict access, which allows remote authenticated users to (1) update the firmware via the squashfs parameter to upgrade_step2.sh or (2) obtain hashed passwords via the cgi-bin/cmh/backup.sh page.
CVE-2013-1350 1 Veraxsystems 1 Network Management System 2020-02-03 6.4 MEDIUM 9.1 CRITICAL
Verax NMS prior to 2.1.0 has multiple security bypass vulnerabilities
CVE-2020-2097 1 Jenkins 1 Sounds 2020-01-23 6.5 MEDIUM 8.8 HIGH
Jenkins Sounds Plugin 0.5 and earlier does not perform permission checks in URLs performing form validation, allowing attackers with Overall/Read access to execute arbitrary OS commands as the OS user account running Jenkins.
CVE-2012-3821 1 Arialsoftware 1 Campaign Enterprise 2020-01-22 4.0 MEDIUM 4.3 MEDIUM
A Security Bypass vulnerability exists in the activate.asp page in Arial Software Campaign Enterprise 11.0.551, which could let a remote malicious user modify the SerialNumber field.
CVE-2019-19681 1 Artica 1 Pandora Fms 2020-01-21 9.0 HIGH 8.8 HIGH
** DISPUTED ** Pandora FMS 7.x suffers from remote code execution vulnerability. With an authenticated user who can modify the alert system, it is possible to define and execute commands as root/Administrator. NOTE: The product vendor states that the vulnerability as it is described is not in fact an actual vulnerability. They state that to be able to create alert commands, you need to have admin rights. They also state that the extended ACL system can disable access to specific sections of the configuration, such as defining new alert commands.
CVE-2016-6591 1 Symantec 1 Norton App Lock 2020-01-21 3.3 LOW 7.1 HIGH
A security bypass vulnerability exists in Symantec Norton App Lock 1.0.3.186 and earlier if application pinning is enabled, which could let a local malicious user bypass security restrictions.
CVE-2013-4985 1 Vivotek 6 Ip7160, Ip7160 Firmware, Ip7361 and 3 more 2020-01-17 5.0 MEDIUM 7.5 HIGH
Multiple Vivotek IP Cameras remote authentication bypass that could allow access to the video stream
CVE-2012-3822 1 Arialsoftware 1 Campaign Enterprise 2020-01-15 5.0 MEDIUM 7.5 HIGH
Arial Campaign Enterprise before 11.0.551 has unauthorized access to the User-Edit.asp page, which allows remote attackers to enumerate users' credentials.
CVE-2019-14843 1 Redhat 2 Jboss Enterprise Application Platform, Single Sign-on 2020-01-15 6.5 MEDIUM 8.8 HIGH
A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks. Versions shipped with Red Hat Jboss EAP 7 and Red Hat SSO 7 are vulnerable to this issue.
CVE-2010-3782 2 Obs-server, Suse 2 Obs-server, Linux Enterprise Server 2020-01-14 6.5 MEDIUM 8.8 HIGH
obs-server before 1.7.7 allows logins by 'unconfirmed' accounts due to a bug in the REST api implementation.
CVE-2014-0169 1 Redhat 1 Jboss Enterprise Application Platform 2020-01-14 4.0 MEDIUM 6.5 MEDIUM
In JBoss EAP 6 a security domain is configured to use a cache that is shared between all applications that are in the security domain. This could allow an authenticated user in one application to access protected resources in another application without proper authorization. Although this is an intended functionality, it was not clearly documented which can mislead users into thinking that a security domain cache is isolated to a single application.
CVE-2019-13716 1 Google 1 Chrome 2020-01-13 4.3 MEDIUM 4.3 MEDIUM
Insufficient policy enforcement in service workers in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
CVE-2017-16778 1 Fermax 2 Outdoor Panel, Outdoor Panel Firmware 2020-01-08 2.1 LOW 4.6 MEDIUM
An access control weakness in the DTMF tone receiver of Fermax Outdoor Panel allows physical attackers to inject a Dual-Tone-Multi-Frequency (DTMF) tone to invoke an access grant that would allow physical access to a restricted floor/level. By design, only a residential unit owner may allow such an access grant. However, due to incorrect access control, an attacker could inject it via the speaker unit to perform an access grant to gain unauthorized access, as demonstrated by a loud DTMF tone representing '1' and a long '#' (697 Hz and 1209 Hz, followed by 941 Hz and 1477 Hz).
CVE-2018-20498 1 Gitlab 1 Gitlab 2020-01-08 4.0 MEDIUM 4.3 MEDIUM
An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control.
CVE-2018-20493 1 Gitlab 1 Gitlab 2020-01-07 4.0 MEDIUM 4.3 MEDIUM
An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control.
CVE-2018-20494 1 Gitlab 1 Gitlab 2020-01-07 5.0 MEDIUM 7.5 HIGH
An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control.
CVE-2018-20492 1 Gitlab 1 Gitlab 2020-01-07 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control (issue 2 of 6).
CVE-2019-8512 1 Apple 1 Iphone Os 2019-12-31 7.9 HIGH 5.7 MEDIUM
This issue was addressed with improved transparency. This issue is fixed in iOS 12.2. A user may authorize an enterprise administrator to remotely wipe their device without appropriate disclosure.
CVE-2019-0383 1 Sap 2 Enterprise Extension Financial Services, Treasury And Risk Management \(s4core\) 2019-12-20 6.5 MEDIUM 8.8 HIGH
Transaction Management in SAP Treasury and Risk Management (corrected in S4CORE versions 1.01, 1.02, 1.03, 1.04 and EA-FINSERV versions 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
CVE-2019-0384 1 Sap 2 Enterprise Extension Financial Services, Treasury And Risk Management \(s4core\) 2019-12-20 6.5 MEDIUM 8.8 HIGH
Transaction Management in SAP Treasury and Risk Management (corrected in S4CORE versions 1.01, 1.02, 1.03, 1.04 and EA-FINSERV versions 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0) does not perform necessary authorization checks for functionalities that require user identity.
CVE-2013-4410 2 Fedoraproject, Reviewboard 2 Fedora, Reviewboard 2019-12-13 5.0 MEDIUM 7.5 HIGH
ReviewBoard: has an access-control problem in REST API
CVE-2016-6353 1 Cloudera 1 Cdh 2019-12-12 3.5 LOW 6.5 MEDIUM
Cloudera Search in CDH before 5.7.0 allows unauthorized document access because Solr Queries by document id can bypass Sentry document-level security via the RealTimeGetHandler.
CVE-2013-4411 2 Fedoraproject, Reviewboard 2 Fedora, Reviewboard 2019-12-11 4.0 MEDIUM 4.3 MEDIUM
Review Board: URL processing gives unauthorized users access to review lists
CVE-2011-3617 2 Debian, Tahoe-lafs 2 Debian Linux, Tahoe-lafs 2019-12-11 5.5 MEDIUM 6.5 MEDIUM
Tahoe-LAFS v1.3.0 through v1.8.2 could allow unauthorized users to delete immutable files in some cases.
CVE-2019-14832 1 Redhat 1 Keycloak 2019-12-11 6.0 MEDIUM 7.5 HIGH
A flaw was found in the Keycloak REST API before version 8.0.0 where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.
CVE-2016-3131 1 Cloudera 1 Cdh 2019-12-10 4.0 MEDIUM 6.5 MEDIUM
Cloudera CDH before 5.6.1 allows authorization bypass via direct internal API calls.
CVE-2016-4572 1 Cloudera 1 Cdh 2019-12-10 6.5 MEDIUM 8.8 HIGH
In Cloudera CDH before 5.7.1, Impala REVOKE ALL ON SERVER commands do not revoke all privileges.
CVE-2011-2726 4 Debian, Drupal, Fedoraproject and 1 more 4 Debian Linux, Drupal, Fedora and 1 more 2019-12-03 5.0 MEDIUM 7.5 HIGH
An access bypass issue was found in Drupal 7.x before version 7.5. If a Drupal site has the ability to attach File upload fields to any entity type in the system or has the ability to point individual File upload fields to the private file directory in comments, and the parent node is denied access, non-privileged users can still download the file attached to the comment if they know or guess its direct URL.
CVE-2015-1780 1 Redhat 2 Ovirt-engine, Virtualization 2019-11-25 4.0 MEDIUM 6.5 MEDIUM
oVirt users with MANIPULATE_STORAGE_DOMAIN permissions can attach a storage domain to any data-center
CVE-2012-2238 1 Tryton 1 Trytond 2019-11-22 5.0 MEDIUM 7.5 HIGH
trytond 2.4: ModelView.button fails to validate authorization
CVE-2011-1070 2 Debian, V86d Project 2 Debian Linux, V86d 2019-11-18 7.2 HIGH 7.8 HIGH
v86d before 0.1.10 do not verify if received netlink messages are sent by the kernel. This could allow unprivileged users to manipulate the video mode and potentially other consequences.