CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Related To CWE-732

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2022-45307 732 2022-11-29 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
Insecure permissions in Chocolatey PHP package v8.1.12 and below grants all users in the Authenticated Users group write privileges for the subfolder C:\tools\php81 and all files located in that folder.
2 CVE-2022-45306 732 2022-11-29 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
Insecure permissions in Chocolatey Azure-Pipelines-Agent package v2.211.1 and below grants all users in the Authenticated Users group write privileges for the subfolder C:\agent and all files located in that folder.
3 CVE-2022-45305 732 2022-11-29 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
Insecure permissions in Chocolatey Python3 package v3.11.0 and below grants all users in the Authenticated Users group write privileges for the subfolder C:\Python311 and all files located in that folder.
4 CVE-2022-45304 732 2022-11-29 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
Insecure permissions in Chocolatey Cmder package v1.3.20 and below grants all users in the Authenticated Users group write privileges for the path C:\tools\Cmder and all files located in that folder.
5 CVE-2022-45301 732 2022-11-29 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
Insecure permissions in Chocolatey Ruby package v3.1.2.1 and below grants all users in the Authenticated Users group write privileges for the path C:\tools\ruby31 and all files located in that folder.
6 CVE-2022-45193 732 2022-11-12 2022-11-16
0.0
None ??? ??? ??? ??? ??? ???
CBRN-Analysis before 22 has weak file permissions under Public Profile, leading to disclosure of file contents or privilege escalation.
7 CVE-2022-44746 732 2022-11-07 2022-11-08
0.0
None ??? ??? ??? ??? ??? ???
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.
8 CVE-2022-44733 732 2022-11-07 2022-11-08
0.0
None ??? ??? ??? ??? ??? ???
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900.
9 CVE-2022-44725 732 2022-11-17 2022-11-22
0.0
None ??? ??? ??? ??? ??? ???
OPC Foundation Local Discovery Server (LDS) through 1.04.403.478 uses a hard-coded file path to a configuration file. This allows a normal user to create a malicious file that is loaded by LDS (running as a high-privilege user).
10 CVE-2022-44280 732 2022-11-23 2022-11-28
0.0
None ??? ??? ??? ??? ??? ???
Automotive Shop Management System v1.0 is vulnerable to Delete any file via /asms/classes/Master.php?f=delete_img.
11 CVE-2022-42788 732 2022-11-01 2022-11-02
0.0
None ??? ??? ??? ??? ??? ???
A permissions issue existed. This issue was addressed with improved permission validation. This issue is fixed in macOS Ventura 13. A malicious application may be able to read sensitive location information.
12 CVE-2022-41471 732 2022-10-17 2022-10-29
0.0
None ??? ??? ??? ??? ??? ???
74cmsSE v3.12.0 allows authenticated attackers with low-level privileges to arbitrarily change the rights and credentials of the Super Administrator account.
13 CVE-2022-40817 732 2022-09-27 2022-09-29
0.0
None ??? ??? ??? ??? ??? ???
Zammad 5.2.1 has a fine-grained permission model that allows to configure read-only access to tickets. However, agents were still wrongly able to perform some operations on such tickets, like adding and removing links, tags. and related answers. This issue has been fixed in 5.2.2.
14 CVE-2022-39887 732 2022-11-09 2022-11-10
0.0
None ??? ??? ??? ??? ??? ???
Improper access control vulnerability in clearAllGlobalProxy in MiscPolicy prior to SMR Nov-2022 Release 1 allows local attacker to configure EDM setting.
15 CVE-2022-39883 732 2022-11-09 2022-11-10
0.0
None ??? ??? ??? ??? ??? ???
Improper authorization vulnerability in StorageManagerService prior to SMR Nov-2022 Release 1 allows local attacker to call privileged API.
16 CVE-2022-39219 732 Bypass 2022-09-26 2022-09-28
0.0
None ??? ??? ??? ??? ??? ???
Bifrost is a middleware package which can synchronize MySQL/MariaDB binlog data to other types of databases. Versions 1.8.6-release and prior are vulnerable to authentication bypass when using HTTP basic authentication. This may allow group members who only have read permissions to write requests when they are normally forbidden from doing so. Version 1.8.7-release contains a patch. There are currently no known workarounds.
17 CVE-2022-38461 732 2022-11-17 2022-11-21
0.0
None ??? ??? ??? ??? ??? ???
Broken Access Control vulnerability in WPML Multilingual CMS premium plugin <= 4.5.10 on WordPress allows users with a subscriber or higher user role to change plugin settings (selected language for legacy widgets, the default behavior for media content).
18 CVE-2022-38183 732 2022-08-12 2022-11-16
0.0
None ??? ??? ??? ??? ??? ???
In Gitea before 1.16.9, it was possible for users to add existing issues to projects. Due to improper access controls, an attacker could assign any issue to any project in Gitea (there was no permission check for fetching the issue). As a result, the attacker would get access to private issue titles.
19 CVE-2022-37771 732 2022-09-06 2022-09-09
0.0
None ??? ??? ??? ??? ??? ???
IObit Malware Fighter v9.2 for Microsoft Windows lacks tamper protection, allowing authenticated attackers with Administrator privileges to modify processes within the application and escalate privileges to SYSTEM via a crafted executable.
20 CVE-2022-37458 732 2022-09-02 2022-09-08
0.0
None ??? ??? ??? ??? ??? ???
Discourse through 2.8.7 allows admins to send invitations to arbitrary email addresses at an unlimited rate.
21 CVE-2022-37190 732 Exec Code 2022-09-13 2022-09-17
0.0
None ??? ??? ??? ??? ??? ???
CuppaCMS 1.0 is vulnerable to Remote Code Execution (RCE). An authenticated user can control both parameters (action and function) from "/api/index.php.
22 CVE-2022-36687 732 2022-08-29 2022-09-01
0.0
None ??? ??? ??? ??? ??? ???
Ingredients Stock Management System v1.0 was discovered to contain an arbitrary file deletion vulnerability via the component /classes/Master.php?f=delete_img.
23 CVE-2022-36670 732 2022-09-06 2022-09-12
0.0
None ??? ??? ??? ??? ??? ???
PCProtect Endpoint prior to v5.17.470 for Microsoft Windows lacks tamper protection, allowing authenticated attackers with Administrator privileges to modify processes within the application and escalate privileges to SYSTEM via a crafted executable.
24 CVE-2022-36122 732 2022-10-21 2022-10-24
0.0
None ??? ??? ??? ??? ??? ???
The Automox Agent before 40 on Windows incorrectly sets permissions on key files.
25 CVE-2022-36103 732 2022-09-13 2022-09-16
0.0
None ??? ??? ??? ??? ??? ???
Talos Linux is a Linux distribution built for Kubernetes deployments. Talos worker nodes use a join token to get accepted into the Talos cluster. Due to improper validation of the request while signing a worker node CSR (certificate signing request) Talos control plane node might issue Talos API certificate which allows full access to Talos API on a control plane node. Accessing Talos API with full level access on a control plane node might reveal sensitive information which allows full level access to the cluster (Kubernetes and Talos PKI, etc.). Talos API join token is stored in the machine configuration on the worker node. When configured correctly, Kubernetes workloads don't have access to the machine configuration, but due to a misconfiguration workload might access the machine configuration and reveal the join token. This problem has been fixed in Talos 1.2.2. Enabling the Pod Security Standards mitigates the vulnerability by denying hostPath mounts and host networking by default in the baseline policy. Clusters that don't run untrusted workloads are not affected. Clusters with correct Pod Security configurations which don't allow hostPath mounts, and secure access to cloud metadata server (or machine configuration is not supplied via cloud metadata server) are not affected.
26 CVE-2022-35250 732 2022-09-23 2022-09-27
0.0
None ??? ??? ??? ??? ??? ???
A privilege escalation vulnerability exists in Rocket.chat <v5 which made it possible to elevate privileges for any authenticated user to view Direct messages without appropriate permissions.
27 CVE-2022-34891 732 Exec Code 2022-07-18 2022-07-28
0.0
None ??? ??? ??? ??? ??? ???
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop Parallels Desktop 17.1.1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the update machanism. The product sets incorrect permissions on sensitive files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-16395.
28 CVE-2022-34314 732 2022-11-14 2022-11-16
0.0
None ??? ??? ??? ??? ??? ???
IBM CICS TX 11.1 could disclose sensitive information to a local user due to insecure permission settings. IBM X-Force ID: 229450.
29 CVE-2022-34112 732 2022-07-22 2022-07-31
0.0
None ??? ??? ??? ??? ??? ???
An access control issue in the component /api/plugin/uninstall Dataease v1.11.1 allows attackers to arbitrarily uninstall the plugin, a right normally reserved for the administrator.
30 CVE-2022-34012 732 2022-06-23 2022-06-29
4.0
None Remote Low ??? None Partial None
Insecure permissions in OneBlog v2.3.4 allows low-level administrators to reset the passwords of high-level administrators who hold greater privileges.
31 CVE-2022-34006 732 Exec Code 2022-06-19 2022-06-29
7.2
None Local Low Not required Complete Complete Complete
An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. When installing, Microsoft SQL Express 2019 installs by default with an SQL instance running as SYSTEM with BUILTIN\Users as sysadmin, thus enabling unprivileged Windows users to execute commands locally as NT AUTHORITY\SYSTEM, aka NX-I674 (sub-issue 2). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation.
32 CVE-2022-33695 732 2022-07-12 2022-07-15
4.6
None Local Low Not required Partial Partial Partial
Use of improper permission in InputManagerService prior to SMR Jul-2022 Release 1 allows unauthorized access to the service.
33 CVE-2022-33689 732 2022-07-12 2022-07-16
2.1
None Local Low Not required None Partial None
Improper access control vulnerability in TelephonyUI prior to SMR Jul-2022 Release 1 allows attackers to change preferred network type by unprotected binder call.
34 CVE-2022-33311 732 Bypass 2022-08-18 2022-08-19
0.0
None ??? ??? ??? ??? ??? ???
Browse restriction bypass vulnerability in Address Book of Cybozu Office 10.0.0 to 10.8.5 allows a remote authenticated attacker to obtain the data of Address Book via unspecified vectors.
35 CVE-2022-32778 732 +Info 2022-08-22 2022-08-24
0.0
None ??? ??? ??? ??? ??? ???
An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerability is for the pass cookie, which contains the hashed password and can be leaked via JavaScript.
36 CVE-2022-32777 732 +Info 2022-08-22 2022-08-24
0.0
None ??? ??? ??? ??? ??? ???
An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerabilty is for the session cookie which can be leaked via JavaScript.
37 CVE-2022-32583 732 Bypass 2022-08-18 2022-08-19
0.0
None ??? ??? ??? ??? ??? ???
Operation restriction bypass vulnerability in Scheduler of Cybozu Office 10.0.0 to 10.8.5 allows a remote authenticated attacker to alter the data of Scheduler via unspecified vectors.
38 CVE-2022-32544 732 Bypass 2022-08-18 2022-08-19
0.0
None ??? ??? ??? ??? ??? ???
Operation restriction bypass vulnerability in Project of Cybozu Office 10.0.0 to 10.8.5 allows a remote authenticated attacker to alter the data of Project via unspecified vectors.
39 CVE-2022-32227 732 +Info 2022-09-23 2022-09-27
0.0
None ??? ??? ??? ??? ??? ???
A cleartext transmission of sensitive information exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 relating to Oauth tokens by having the permission "view-full-other-user-info", this could cause an oauth token leak in the product.
40 CVE-2022-32169 732 2022-09-28 2022-10-03
0.0
None ??? ??? ??? ??? ??? ???
The “Bytebase” application does not restrict low privilege user to access “admin issues“ for which an unauthorized user can view the “OPEN” and “CLOSED” issues by “Admin” and the affected endpoint is “/issue”.
41 CVE-2022-32155 732 2022-06-15 2022-06-24
5.0
None Remote Low Not required Partial None None
In universal forwarder versions before 9.0, management services are available remotely by default. When not required, it introduces a potential exposure, but it is not a vulnerability. If exposed, we recommend each customer assess the potential severity specific to your environment. In 9.0, the universal forwarder now binds the management port to localhost preventing remote logins by default. If management services are not required in versions before 9.0, set disableDefaultPort = true in server.conf OR allowRemoteLogin = never in server.conf OR mgmtHostPort = localhost in web.conf. See Configure universal forwarder management security (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_universal_forwarder_management_security) for more information on disabling the remote management services.
42 CVE-2022-31465 732 2022-06-14 2022-06-22
4.6
None Local Low Not required Partial Partial Partial
A vulnerability has been identified in Xpedition Designer (All versions < VX.2.11). The affected application assigns improper access rights to the service executable. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges.
43 CVE-2022-30929 732 2022-07-06 2022-07-14
6.5
None Remote Low ??? Partial Partial Partial
Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper.
44 CVE-2022-30700 732 Exec Code 2022-05-27 2022-06-08
7.2
None Local Low Not required Complete Complete Complete
An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
45 CVE-2022-30508 732 2022-05-26 2022-06-03
5.5
None Remote Low ??? None Partial Partial
DedeCMS v5.7.93 was discovered to contain arbitrary file deletion vulnerability in upload.php via the delete parameter.
46 CVE-2022-29405 732 2022-05-25 2022-06-06
4.0
None Remote Low ??? None Partial None
In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8
47 CVE-2022-29271 732 2022-06-29 2022-07-08
4.0
None Remote Low ??? None Partial None
In Nagios XI through 5.8.5, a read-only Nagios user (due to an incorrect permission check) is able to schedule downtime for any host/services. This allows an attacker to permanently disable all monitoring checks.
48 CVE-2022-29263 732 2022-05-05 2022-05-12
4.6
None Local Low Not required Partial Partial Partial
On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, the BIG-IP Edge Client Component Installer Service does not use best practice while saving temporary files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
49 CVE-2022-28802 732 Exec Code 2022-09-21 2022-09-26
0.0
None ??? ??? ??? ??? ??? ???
Code by Zapier before 2022-08-17 allowed intra-account privilege escalation that included execution of Python or JavaScript code. In other words, Code by Zapier was providing a customer-controlled general-purpose virtual machine that unintentionally granted full access to all users of a company's account, but was supposed to enforce role-based access control within that company's account. Before 2022-08-17, a customer could have resolved this by (in effect) using a separate virtual machine for an application that held credentials - or other secrets - that weren't supposed to be shared among all of its employees. (Multiple accounts would have been needed to operate these independent virtual machines.)
50 CVE-2022-28692 732 2022-07-04 2022-07-12
4.0
None Remote Low ??? None Partial None
Improper input validation vulnerability in Scheduler of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter the data of Scheduler.
Total number of vulnerabilities : 962   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.