Filtered by CWE-276
Total 1043 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-24343 1 Jetbrains 1 Youtrack 2024-08-03 4.3 Medium
In JetBrains YouTrack before 2021.4.31698, a custom logo could be set by a user who has read-only permissions.
CVE-2022-24337 1 Jetbrains 1 Teamcity 2024-08-03 6.5 Medium
In JetBrains TeamCity before 2021.2, health items of pull requests were shown to users who lacked appropriate permissions.
CVE-2022-24301 2 Debian, Minetest 2 Debian Linux, Minetest 2024-08-03 6.5 Medium
In Minetest before 5.4.0, players can add or subtract items from a different player's inventory.
CVE-2022-23995 1 Samsung 1 Wear Os 2024-08-03 4 Medium
Unprotected component vulnerability in StBedtimeModeAlarmReceiver in Wear OS 3.0 prior to Firmware update Feb-2022 Release allows untrusted applications to change bedtime mode without a proper permission.
CVE-2022-23996 1 Samsung 1 Wear Os 2024-08-03 4 Medium
Unprotected component vulnerability in StTheaterModeReceiver in Wear OS 3.0 prior to Firmware update Feb-2022 Release allows untrusted applications to enable bedtime mode without a proper permission.
CVE-2022-22296 1 Hospital\'s Patient Records Management System Project 1 Hospital\'s Patient Records Management System 2024-08-03 5.3 Medium
Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to Insecure Permissions via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed.
CVE-2022-21704 2 Debian, Log4js Project 2 Debian Linux, Log4js 2024-08-03 5.5 Medium
log4js-node is a port of log4js to node.js. In affected versions default file permissions for log files created by the file, fileSync and dateFile appenders are world-readable (in unix). This could cause problems if log files contain sensitive information. This would affect any users that have not supplied their own permissions for the files via the mode parameter in the config. Users are advised to update.
CVE-2022-21204 1 Intel 1 Quartus Prime 2024-08-03 7.8 High
Improper permissions for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-20614 2 Jenkins, Oracle 2 Mailer, Communications Cloud Native Core Automated Test Suite 2024-08-03 4.3 Medium
A missing permission check in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
CVE-2022-20611 1 Google 1 Android 2024-08-03 7.8 High
In deletePackageVersionedInternal of DeletePackageHelper.java, there is a possible way to bypass carrier restrictions due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242996180
CVE-2022-20618 1 Jenkins 1 Bitbucket Branch Source 2024-08-03 4.3 Medium
A missing permission check in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2022-20436 1 Google 1 Android 2024-08-03 7.8 High
There is an unauthorized service in the system service. Since the component does not have permission check, resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242248369
CVE-2022-20435 1 Google 1 Android 2024-08-03 7.8 High
There is a Unauthorized service in the system service, may cause the system reboot. Since the component does not have permission check and permission protection, resulting in EoP problem.Product: AndroidVersions: Android SoCAndroid ID: A-242248367
CVE-2022-20272 1 Google 1 Android 2024-08-03 5.5 Medium
In PermissionController, there is a possible misunderstanding about the default SMS application's permission set due to misleading text. This could lead to local information disclosure with User privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-207672568
CVE-2022-20246 1 Google 1 Android 2024-08-03 7.8 High
In WindowManager, there is a possible bypass of the restrictions for starting activities from the background due to an incorrect UID/permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-230493191
CVE-2022-4964 1 Canonical 1 Ubuntu Pipewire-pulse 2024-08-03 5.5 Medium
Ubuntu's pipewire-pulse in snap grants microphone access even when the snap interface for audio-record is not set.
CVE-2022-4568 1 Lenovo 1 System Update 2024-08-03 7 High
A directory permissions management vulnerability in Lenovo System Update may allow elevation of privileges.
CVE-2022-4575 1 Lenovo 26 Thinkpad 25, Thinkpad 25 Firmware, Thinkpad L560 and 23 more 2024-08-03 6.7 Medium
A vulnerability due to improper write protection of UEFI variables was reported in the BIOS of some ThinkPad models could allow an attacker with physical or local access and elevated privileges the ability to bypass Secure Boot.
CVE-2022-4569 1 Lenovo 2 Thinkpad Hybrid Usb-c With Usb-a Dock, Thinkpad Hybrid Usb-c With Usb-a Dock Firmware 2024-08-03 7.8 High
A local privilege escalation vulnerability in the ThinkPad Hybrid USB-C with USB-A Dock Firmware Update Tool could allow an attacker with local access to execute code with elevated privileges during the package upgrade or installation.
CVE-2022-4020 1 Acer 10 Aspire A115-21, Aspire A115-21 Firmware, Aspire A315-22 and 7 more 2024-08-03 8.1 High
Vulnerability in the HQSwSmiDxe DXE driver on some consumer Acer Notebook devices may allow an attacker with elevated privileges to modify UEFI Secure Boot settings by modifying an NVRAM variable.