Search Results (7644 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2012-3821 1 Arialsoftware 1 Campaign Enterprise 2024-11-21 4.3 Medium
A Security Bypass vulnerability exists in the activate.asp page in Arial Software Campaign Enterprise 11.0.551, which could let a remote malicious user modify the SerialNumber field.
CVE-2012-2238 1 Tryton 1 Trytond 2024-11-21 7.5 High
trytond 2.4: ModelView.button fails to validate authorization
CVE-2012-0055 2 Canonical, Linux 2 Ubuntu Linux, Linux Kernel 2024-11-21 7.8 High
OverlayFS in the Linux kernel before 3.0.0-16.28, as used in Ubuntu 10.0.4 LTS and 11.10, is missing inode security checks which could allow attackers to bypass security restrictions and perform unauthorized actions.
CVE-2011-4183 1 Opensuse 1 Open Build Service 2024-11-21 N/A
A vulnerability in open build service allows remote attackers to upload arbitrary RPM files. Affected releases are SUSE open build service prior to 2.1.16.
CVE-2011-3617 2 Debian, Tahoe-lafs 2 Debian Linux, Tahoe-lafs 2024-11-21 6.5 Medium
Tahoe-LAFS v1.3.0 through v1.8.2 could allow unauthorized users to delete immutable files in some cases.
CVE-2011-2726 4 Debian, Drupal, Fedoraproject and 1 more 4 Debian Linux, Drupal, Fedora and 1 more 2024-11-21 7.5 High
An access bypass issue was found in Drupal 7.x before version 7.5. If a Drupal site has the ability to attach File upload fields to any entity type in the system or has the ability to point individual File upload fields to the private file directory in comments, and the parent node is denied access, non-privileged users can still download the file attached to the comment if they know or guess its direct URL.
CVE-2011-1070 2 Debian, V86d Project 2 Debian Linux, V86d 2024-11-21 7.8 High
v86d before 0.1.10 do not verify if received netlink messages are sent by the kernel. This could allow unprivileged users to manipulate the video mode and potentially other consequences.
CVE-2010-3782 2 Obs-server, Suse 2 Obs-server, Linux Enterprise Server 2024-11-21 8.8 High
obs-server before 1.7.7 allows logins by 'unconfirmed' accounts due to a bug in the REST api implementation.
CVE-2010-2548 1 Redhat 1 Icedtea6 2024-11-21 9.1 Critical
IcedTea6 before 1.7.4 does not properly check property access, which allows unsigned apps to read and write arbitrary files.
CVE-2010-2525 1 Linux 1 Linux Kernel 2024-11-21 7.8 High
A flaw was discovered in gfs2 file system’s handling of acls (access control lists). An unprivileged local attacker could exploit this flaw to gain access or execute any file stored in the gfs2 file system.
CVE-2010-1435 1 Joomla 1 Joomla\! 2024-11-21 9.8 Critical
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise restricted actions and subsequently retrieve password reset tokens from the database through an already existing SQL injection vector. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulnerable.
CVE-2009-3723 2 Debian, Sangoma 2 Debian Linux, Asterisk 2024-11-21 7.5 High
asterisk allows calls on prohibited networks
CVE-2024-10897 1 Themeum 1 Tutor Lms Elementor Addons 2024-11-20 4.3 Medium
The Tutor LMS Elementor Addons plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the install_etlms_dependency_plugin() function in all versions up to, and including, 2.1.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install Elementor or Tutor LMS. Please note the impact of this issue is incredibly limited due to the fact that these two plugins will likely already be installed as a dependency of the plugin.
CVE-2024-52395 1 Quantumcloud 1 Floating Buttons 2024-11-20 5.3 Medium
Missing Authorization vulnerability in QunatumCloud Floating Buttons for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Floating Buttons for WooCommerce: from n/a through 2.8.8.
CVE-2024-7836 1 Themify 1 Builder 2024-11-20 4.3 Medium
The Themify Builder plugin for WordPress is vulnerable to unauthorized post duplication due to missing checks on the duplicate_page_ajaxify function in all versions up to, and including, 7.6.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to duplicate and view private or draft posts created by other users that otherwise shouldn't be accessible to them.
CVE-2024-48897 1 Moodle 1 Moodle 2024-11-20 6.5 Medium
A vulnerability was found in Moodle. Additional checks are required to ensure users can only edit or delete RSS feeds that they have permission to modify.
CVE-2024-48898 1 Moodle 1 Moodle 2024-11-20 6.5 Medium
A vulnerability was found in Moodle. Users with access to delete audiences from reports could delete audiences from other reports that they do not have permission to delete from.
CVE-2024-48901 1 Moodle 1 Moodle 2024-11-20 4.3 Medium
A vulnerability was found in Moodle. Additional checks are required to ensure users can only access the schedule of a report if they have permission to edit that report.
CVE-2024-51671 2024-11-20 2.7 Low
Missing Authorization vulnerability in ThemeIsle Otter - Gutenberg Block allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Otter - Gutenberg Block: from n/a through 3.0.3.
CVE-2024-49689 2024-11-20 5.4 Medium
Missing Authorization vulnerability in Harmonic Design HD Quiz – Save Results Light allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects HD Quiz – Save Results Light: from n/a through 0.5.