Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-4952

Summary
Assigner-vmware
Assigner Org ID-dcf2e128-44bd-42ed-91e8-88f912c1401d
Published At-02 May, 2018 | 14:00
Updated At-16 Sep, 2024 | 23:41
Rejected At-
Credits

VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:vmware
Assigner Org ID:dcf2e128-44bd-42ed-91e8-88f912c1401d
Published At:02 May, 2018 | 14:00
Updated At:16 Sep, 2024 | 23:41
Rejected At:
▼CVE Numbering Authority (CNA)

VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure.

Affected Products
Vendor
VMware (Broadcom Inc.)VMware
Product
VMware Xenon
Versions
Affected
  • 1.x prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8.
Problem Types
TypeCWE IDDescription
textN/AAuthentication bypass vulnerability
Type: text
CWE ID: N/A
Description: Authentication bypass vulnerability
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/vmware/xenon/commit/b1fd306047ecdac82661d636ebee801a7f2b3a0a
x_refsource_CONFIRM
https://github.com/vmware/xenon/commit/30ae41bccf418d88b52b35a81efb3c1304b798f8
x_refsource_CONFIRM
http://www.securityfocus.com/bid/103093
vdb-entry
x_refsource_BID
https://github.com/vmware/xenon/commit/756d893573414eec8635c2aba2345c4dcf10b21c
x_refsource_CONFIRM
http://seclists.org/oss-sec/2018/q1/153
mailing-list
x_refsource_MLIST
https://github.com/vmware/xenon/commit/5682ef8d40569afd00fb9a5933e7706bb5b66713
x_refsource_CONFIRM
https://github.com/vmware/xenon/commit/ec30db9afada9cb52852082ce4d7d0095524f3b3
x_refsource_CONFIRM
https://github.com/vmware/xenon/commit/055ae13603f0cc3cd7cf59f20ce314bf8db583e1
x_refsource_CONFIRM
https://github.com/vmware/xenon/commit/c23964eb57e846126daef98ef7ed15400313e977
x_refsource_CONFIRM
https://github.com/vmware/xenon/commit/7a747d82b80cd38d2c11a0d9cdedb71c722a2c75
x_refsource_CONFIRM
https://github.com/vmware/xenon/commit/06b9947cf603ba40fd8b03bfeb2e84528a7ab592
x_refsource_CONFIRM
Hyperlink: https://github.com/vmware/xenon/commit/b1fd306047ecdac82661d636ebee801a7f2b3a0a
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/vmware/xenon/commit/30ae41bccf418d88b52b35a81efb3c1304b798f8
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/103093
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://github.com/vmware/xenon/commit/756d893573414eec8635c2aba2345c4dcf10b21c
Resource:
x_refsource_CONFIRM
Hyperlink: http://seclists.org/oss-sec/2018/q1/153
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://github.com/vmware/xenon/commit/5682ef8d40569afd00fb9a5933e7706bb5b66713
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/vmware/xenon/commit/ec30db9afada9cb52852082ce4d7d0095524f3b3
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/vmware/xenon/commit/055ae13603f0cc3cd7cf59f20ce314bf8db583e1
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/vmware/xenon/commit/c23964eb57e846126daef98ef7ed15400313e977
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/vmware/xenon/commit/7a747d82b80cd38d2c11a0d9cdedb71c722a2c75
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/vmware/xenon/commit/06b9947cf603ba40fd8b03bfeb2e84528a7ab592
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/vmware/xenon/commit/b1fd306047ecdac82661d636ebee801a7f2b3a0a
x_refsource_CONFIRM
x_transferred
https://github.com/vmware/xenon/commit/30ae41bccf418d88b52b35a81efb3c1304b798f8
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/103093
vdb-entry
x_refsource_BID
x_transferred
https://github.com/vmware/xenon/commit/756d893573414eec8635c2aba2345c4dcf10b21c
x_refsource_CONFIRM
x_transferred
http://seclists.org/oss-sec/2018/q1/153
mailing-list
x_refsource_MLIST
x_transferred
https://github.com/vmware/xenon/commit/5682ef8d40569afd00fb9a5933e7706bb5b66713
x_refsource_CONFIRM
x_transferred
https://github.com/vmware/xenon/commit/ec30db9afada9cb52852082ce4d7d0095524f3b3
x_refsource_CONFIRM
x_transferred
https://github.com/vmware/xenon/commit/055ae13603f0cc3cd7cf59f20ce314bf8db583e1
x_refsource_CONFIRM
x_transferred
https://github.com/vmware/xenon/commit/c23964eb57e846126daef98ef7ed15400313e977
x_refsource_CONFIRM
x_transferred
https://github.com/vmware/xenon/commit/7a747d82b80cd38d2c11a0d9cdedb71c722a2c75
x_refsource_CONFIRM
x_transferred
https://github.com/vmware/xenon/commit/06b9947cf603ba40fd8b03bfeb2e84528a7ab592
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/vmware/xenon/commit/b1fd306047ecdac82661d636ebee801a7f2b3a0a
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/vmware/xenon/commit/30ae41bccf418d88b52b35a81efb3c1304b798f8
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/103093
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://github.com/vmware/xenon/commit/756d893573414eec8635c2aba2345c4dcf10b21c
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://seclists.org/oss-sec/2018/q1/153
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://github.com/vmware/xenon/commit/5682ef8d40569afd00fb9a5933e7706bb5b66713
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/vmware/xenon/commit/ec30db9afada9cb52852082ce4d7d0095524f3b3
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/vmware/xenon/commit/055ae13603f0cc3cd7cf59f20ce314bf8db583e1
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/vmware/xenon/commit/c23964eb57e846126daef98ef7ed15400313e977
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/vmware/xenon/commit/7a747d82b80cd38d2c11a0d9cdedb71c722a2c75
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/vmware/xenon/commit/06b9947cf603ba40fd8b03bfeb2e84528a7ab592
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@vmware.com
Published At:02 May, 2018 | 14:29
Updated At:03 Oct, 2019 | 00:03

VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.5HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.0
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

VMware (Broadcom Inc.)
vmware
>>xenon>>Versions from 1.0.0(inclusive) to 1.5.3(inclusive)
cpe:2.3:a:vmware:xenon:*:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.1.0
cpe:2.3:a:vmware:xenon:1.1.0:cr0-3:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.1.0
cpe:2.3:a:vmware:xenon:1.1.0:cr3_1:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.3.7
cpe:2.3:a:vmware:xenon:1.3.7:cr1_2:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.4.2
cpe:2.3:a:vmware:xenon:1.4.2:cr4_1:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.5.4
cpe:2.3:a:vmware:xenon:1.5.4:cr2:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.5.4
cpe:2.3:a:vmware:xenon:1.5.4:cr3:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.5.4
cpe:2.3:a:vmware:xenon:1.5.4:cr4:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.5.4
cpe:2.3:a:vmware:xenon:1.5.4:cr5:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.5.4
cpe:2.3:a:vmware:xenon:1.5.4:cr6:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.5.4
cpe:2.3:a:vmware:xenon:1.5.4:cr6_1:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.5.4
cpe:2.3:a:vmware:xenon:1.5.4:cr6_2:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.5.4
cpe:2.3:a:vmware:xenon:1.5.4:cr7:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.5.4_8
cpe:2.3:a:vmware:xenon:1.5.4_8:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>xenon>>1.5.7_7
cpe:2.3:a:vmware:xenon:1.5.7_7:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-732Primarynvd@nist.gov
CWE ID: CWE-732
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://seclists.org/oss-sec/2018/q1/153security@vmware.com
Mailing List
Third Party Advisory
http://www.securityfocus.com/bid/103093security@vmware.com
Third Party Advisory
VDB Entry
https://github.com/vmware/xenon/commit/055ae13603f0cc3cd7cf59f20ce314bf8db583e1security@vmware.com
Patch
Third Party Advisory
https://github.com/vmware/xenon/commit/06b9947cf603ba40fd8b03bfeb2e84528a7ab592security@vmware.com
Patch
Third Party Advisory
https://github.com/vmware/xenon/commit/30ae41bccf418d88b52b35a81efb3c1304b798f8security@vmware.com
Patch
Third Party Advisory
https://github.com/vmware/xenon/commit/5682ef8d40569afd00fb9a5933e7706bb5b66713security@vmware.com
Patch
Third Party Advisory
https://github.com/vmware/xenon/commit/756d893573414eec8635c2aba2345c4dcf10b21csecurity@vmware.com
Patch
Third Party Advisory
https://github.com/vmware/xenon/commit/7a747d82b80cd38d2c11a0d9cdedb71c722a2c75security@vmware.com
Patch
Third Party Advisory
https://github.com/vmware/xenon/commit/b1fd306047ecdac82661d636ebee801a7f2b3a0asecurity@vmware.com
Patch
Third Party Advisory
https://github.com/vmware/xenon/commit/c23964eb57e846126daef98ef7ed15400313e977security@vmware.com
Patch
Third Party Advisory
https://github.com/vmware/xenon/commit/ec30db9afada9cb52852082ce4d7d0095524f3b3security@vmware.com
Patch
Third Party Advisory
Hyperlink: http://seclists.org/oss-sec/2018/q1/153
Source: security@vmware.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/103093
Source: security@vmware.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://github.com/vmware/xenon/commit/055ae13603f0cc3cd7cf59f20ce314bf8db583e1
Source: security@vmware.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/vmware/xenon/commit/06b9947cf603ba40fd8b03bfeb2e84528a7ab592
Source: security@vmware.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/vmware/xenon/commit/30ae41bccf418d88b52b35a81efb3c1304b798f8
Source: security@vmware.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/vmware/xenon/commit/5682ef8d40569afd00fb9a5933e7706bb5b66713
Source: security@vmware.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/vmware/xenon/commit/756d893573414eec8635c2aba2345c4dcf10b21c
Source: security@vmware.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/vmware/xenon/commit/7a747d82b80cd38d2c11a0d9cdedb71c722a2c75
Source: security@vmware.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/vmware/xenon/commit/b1fd306047ecdac82661d636ebee801a7f2b3a0a
Source: security@vmware.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/vmware/xenon/commit/c23964eb57e846126daef98ef7ed15400313e977
Source: security@vmware.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/vmware/xenon/commit/ec30db9afada9cb52852082ce4d7d0095524f3b3
Source: security@vmware.com
Resource:
Patch
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

113Records found

CVE-2018-1000211
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.28% / 50.93%
||
7 Day CHG~0.00%
Published-13 Jul, 2018 | 18:00
Updated-17 Sep, 2024 | 03:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.

Action-Not Available
Vendor-doorkeeper_projectn/a
Product-doorkeepern/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2017-9136
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.36%
||
7 Day CHG~0.00%
Published-21 May, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Mimosa Client Radios before 2.2.3. In the device's web interface, there is a page that allows an attacker to use an unsanitized GET parameter to download files from the device as the root user. The attacker can download any file from the device's filesystem. This can be used to view unsalted, MD5-hashed administrator passwords, which can then be cracked, giving the attacker full admin access to the device's web interface. This vulnerability can also be used to view the plaintext pre-shared key (PSK) for encrypted wireless connections, or to view the device's serial number (which allows an attacker to factory reset the device).

Action-Not Available
Vendor-mimosan/a
Product-backhaul_radiosclient_radiosn/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2017-9615
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.28% / 51.05%
||
7 Day CHG~0.00%
Published-26 Jun, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Password exposure in Cognito Software Moneyworks 8.0.3 and earlier allows attackers to gain administrator access to all data, because verbose logging writes the administrator password to a world-readable file.

Action-Not Available
Vendor-cogniton/a
Product-moneyworksn/a
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2017-8450
Matching Score-4
Assigner-Elastic
ShareView Details
Matching Score-4
Assigner-Elastic
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.00%
||
7 Day CHG~0.00%
Published-16 Jun, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

X-Pack 5.1.1 did not properly apply document and field level security to multi-search and multi-get requests so users without access to a document and/or field may have been able to access this information.

Action-Not Available
Vendor-Elasticsearch BV
Product-x-packElastic X-Pack Security
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2017-7146
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 39.66%
||
7 Day CHG~0.00%
Published-23 Oct, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in certain Apple products. iOS before 11 is affected. The issue involves the "Security" component. It allows attackers to track users across installs via a crafted app that leverages Keychain data mishandling.

Action-Not Available
Vendor-n/aApple Inc.
Product-iphone_osn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-38879
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-3.7||LOW
EPSS-0.19% / 41.27%
||
7 Day CHG~0.00%
Published-24 Jun, 2022 | 16:15
Updated-16 Sep, 2024 | 17:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 209057.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-jazz_team_serverwindowslinux_kernelJazz Team Server
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2017-6356
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.12% / 31.20%
||
7 Day CHG~0.00%
Published-20 Mar, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Palo Alto Networks Terminal Services (aka TS) Agent 6.0, 7.0, and 8.0 before 8.0.1 uses weak permissions for unspecified resources, which allows attackers to obtain sensitive session information via unknown vectors.

Action-Not Available
Vendor-n/aPalo Alto Networks, Inc.
Product-terminal_services_agentn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2017-17568
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.75%
||
7 Day CHG~0.00%
Published-13 Dec, 2017 | 09:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Scubez Posty Readymade Classifieds has Incorrect Access Control for visiting admin/user_activate_submit.php (aka the backend PHP script), which might allow remote attackers to obtain sensitive information via a direct request.

Action-Not Available
Vendor-scubezn/a
Product-posty_readymade_classifiedsn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2017-16754
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.38% / 58.68%
||
7 Day CHG~0.00%
Published-09 Nov, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bolt before 3.3.6 does not properly restrict access to _profiler routes, related to EventListener/ProfilerListener.php and Provider/EventListenerServiceProvider.php.

Action-Not Available
Vendor-boltcmsn/a
Product-boltn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2017-15877
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.34% / 56.23%
||
7 Day CHG~0.00%
Published-18 Dec, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure Permissions vulnerability in db.php file in GPWeb 8.4.61 allows remote attackers to view the password and user database.

Action-Not Available
Vendor-sistemagpwebn/a
Product-gpwebn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2022-32777
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-1.07% / 76.79%
||
7 Day CHG-0.12%
Published-22 Aug, 2022 | 18:28
Updated-15 Apr, 2025 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerabilty is for the session cookie which can be leaked via JavaScript.

Action-Not Available
Vendor-wwbnWWBN
Product-avideoAVideo
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-20416
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-3.7||LOW
EPSS-0.09% / 27.10%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 16:30
Updated-16 Sep, 2024 | 18:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Guardium Data Encryption (GDE) 3.0.0.3 and 4.0.0.4 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 196218.

Action-Not Available
Vendor-IBM Corporation
Product-guardium_data_encryptionGuardium Data Encryption
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-20526
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-3.7||LOW
EPSS-0.40% / 59.92%
||
7 Day CHG~0.00%
Published-27 Oct, 2021 | 16:00
Updated-17 Sep, 2024 | 02:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 198755.

Action-Not Available
Vendor-IBM Corporation
Product-planning_analyticsPlanning Analytics
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found