Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-27578

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-20 Mar, 2023 | 19:00
Updated At-25 Feb, 2025 | 14:52
Rejected At-
Credits

Galaxy vulnerable to unauthorized modification of pages/visualizations due to insufficient permission check

Galaxy is an open-source platform for data analysis. All supported versions of Galaxy are affected prior to 22.01, 22.05, and 23.0 are affected by an insufficient permission check. Unsupported versions are likely affected as far back as the functionality of Visualizations/Pages exists. Due to this issue, an attacker can modify or delete any Galaxy Visualization or Galaxy Page given they know the encoded ID of it. Additionally, they can copy or import any Galaxy Visualization given they know the encoded ID of it. Patches are available for versions 22.01, 22.05, and 23.0. For the changes to take effect, you must restart all Galaxy server processes. There are no supported workarounds.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:20 Mar, 2023 | 19:00
Updated At:25 Feb, 2025 | 14:52
Rejected At:
▼CVE Numbering Authority (CNA)
Galaxy vulnerable to unauthorized modification of pages/visualizations due to insufficient permission check

Galaxy is an open-source platform for data analysis. All supported versions of Galaxy are affected prior to 22.01, 22.05, and 23.0 are affected by an insufficient permission check. Unsupported versions are likely affected as far back as the functionality of Visualizations/Pages exists. Due to this issue, an attacker can modify or delete any Galaxy Visualization or Galaxy Page given they know the encoded ID of it. Additionally, they can copy or import any Galaxy Visualization given they know the encoded ID of it. Patches are available for versions 22.01, 22.05, and 23.0. For the changes to take effect, you must restart all Galaxy server processes. There are no supported workarounds.

Affected Products
Vendor
galaxyproject
Product
galaxy
Versions
Affected
  • < 22.01
Problem Types
TypeCWE IDDescription
CWECWE-284CWE-284: Improper Access Control
CWECWE-863CWE-863: Incorrect Authorization
Type: CWE
CWE ID: CWE-284
Description: CWE-284: Improper Access Control
Type: CWE
CWE ID: CWE-863
Description: CWE-863: Incorrect Authorization
Metrics
VersionBase scoreBase severityVector
3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/galaxyproject/galaxy/security/advisories/GHSA-j8q2-r4g5-f22j
x_refsource_CONFIRM
https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.01.patch
x_refsource_MISC
https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.05.patch
x_refsource_MISC
https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_23.0.patch
x_refsource_MISC
Hyperlink: https://github.com/galaxyproject/galaxy/security/advisories/GHSA-j8q2-r4g5-f22j
Resource:
x_refsource_CONFIRM
Hyperlink: https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.01.patch
Resource:
x_refsource_MISC
Hyperlink: https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.05.patch
Resource:
x_refsource_MISC
Hyperlink: https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_23.0.patch
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/galaxyproject/galaxy/security/advisories/GHSA-j8q2-r4g5-f22j
x_refsource_CONFIRM
x_transferred
https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.01.patch
x_refsource_MISC
x_transferred
https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.05.patch
x_refsource_MISC
x_transferred
https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_23.0.patch
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/galaxyproject/galaxy/security/advisories/GHSA-j8q2-r4g5-f22j
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.01.patch
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.05.patch
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_23.0.patch
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:20 Mar, 2023 | 20:15
Updated At:23 Mar, 2023 | 19:07

Galaxy is an open-source platform for data analysis. All supported versions of Galaxy are affected prior to 22.01, 22.05, and 23.0 are affected by an insufficient permission check. Unsupported versions are likely affected as far back as the functionality of Visualizations/Pages exists. Due to this issue, an attacker can modify or delete any Galaxy Visualization or Galaxy Page given they know the encoded ID of it. Additionally, they can copy or import any Galaxy Visualization given they know the encoded ID of it. Patches are available for versions 22.01, 22.05, and 23.0. For the changes to take effect, you must restart all Galaxy server processes. There are no supported workarounds.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Secondary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CPE Matches

galaxyproject
galaxyproject
>>galaxy>>Versions before 22.01(exclusive)
cpe:2.3:a:galaxyproject:galaxy:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-863Primarynvd@nist.gov
CWE-284Secondarysecurity-advisories@github.com
CWE-863Secondarysecurity-advisories@github.com
CWE ID: CWE-863
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-284
Type: Secondary
Source: security-advisories@github.com
CWE ID: CWE-863
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.01.patchsecurity-advisories@github.com
Broken Link
https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.05.patchsecurity-advisories@github.com
Broken Link
https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_23.0.patchsecurity-advisories@github.com
Broken Link
https://github.com/galaxyproject/galaxy/security/advisories/GHSA-j8q2-r4g5-f22jsecurity-advisories@github.com
Patch
Vendor Advisory
Hyperlink: https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.01.patch
Source: security-advisories@github.com
Resource:
Broken Link
Hyperlink: https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_22.05.patch
Source: security-advisories@github.com
Resource:
Broken Link
Hyperlink: https://depot.galaxyproject.org/patch/GX-2022-0002/modify_pages_viz-release_23.0.patch
Source: security-advisories@github.com
Resource:
Broken Link
Hyperlink: https://github.com/galaxyproject/galaxy/security/advisories/GHSA-j8q2-r4g5-f22j
Source: security-advisories@github.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

117Records found

CVE-2023-20191
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.03% / 7.84%
||
7 Day CHG~0.00%
Published-13 Sep, 2023 | 16:41
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the access control list (ACL) processing on MPLS interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to incomplete support for this feature. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device. There are workarounds that address this vulnerability. This advisory is part of the September 2023 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2023 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication .

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Software
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-27138
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.08%
||
7 Day CHG~0.00%
Published-01 Mar, 2024 | 15:41
Updated-28 May, 2025 | 19:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Archiva: disabling user registration is not effective

** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva. Apache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archiva that fixes this issue. You are recommended to look into migrating to a different solution, or isolate your instance from any untrusted users. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Action-Not Available
Vendor-The Apache Software Foundation
Product-archivaApache Archivaarchiva
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-27187
Matching Score-4
Assigner-Joomla! Project
ShareView Details
Matching Score-4
Assigner-Joomla! Project
CVSS Score-7.5||HIGH
EPSS-0.00% / 0.14%
||
7 Day CHG~0.00%
Published-20 Aug, 2024 | 16:03
Updated-04 Jun, 2025 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
[20240804] - Core - Improper ACL for backend profile view

Improper Access Controls allows backend users to overwrite their username when disallowed.

Action-Not Available
Vendor-Joomla!
Product-joomla\!Joomla! CMSjoomla\!
CWE ID-CWE-284
Improper Access Control
CVE-2023-1136
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 3.67%
||
7 Day CHG~0.00%
Published-27 Mar, 2023 | 14:50
Updated-16 Jan, 2025 | 21:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-1136

In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an unauthenticated attacker could generate a valid token, which would lead to authentication bypass.

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-infrasuite_device_masterInfraSuite Device Master
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-0811
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.1||CRITICAL
EPSS-0.14% / 34.25%
||
7 Day CHG~0.00%
Published-16 Mar, 2023 | 17:41
Updated-16 Jan, 2025 | 21:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program.

Action-Not Available
Vendor-omronOmron
Product-sysmac_cj2h-cpu64-eipsysmac_cj2h-cpu67-eip_firmwaresysmac_cp1l-m30dr-d_firmwaresysmac_cp2e-e30dr-a_firmwaresysmac_cp1l-m60dt-asysmac_cj2h-cpu67-eipsysmac_cp1l-l10dt-asysmac_cp2e-n30dt1-d_firmwaresysmac_cp1l-l10dt-dsysmac_cp2e-s60dt-d_firmwaresysmac_cj2h-cpu64_firmwaresysmac_cp2e-n40dt1-dsysmac_cp2e-n40dr-dsysmac_cp2e-e40dr-a_firmwaresysmac_cp2e-s30dt-dsysmac_cp1l-em30dr-d_firmwaresysmac_cp2e-n30dr-d_firmwaresysmac_cp1l-m40dr-dsysmac_cp1l-m60dt-dsysmac_cp2e-n40dt1-d_firmwaresysmac_cp2e-n20dr-asysmac_cp1l-m40dt-asysmac_cp2e-n30dr-dsysmac_cp2e-n60dt1-dsysmac_cs1w-fln22_firmwaresysmac_cp2e-e14dr-asysmac_cp1e-na20dt-d_firmwaresysmac_cs1w-eip21_firmwaresysmac_cp1l-m60dt1-d_firmwaresysmac_cj2m-cpu15sysmac_cp1l-l14dt-dsysmac_cj2m-cpu32_firmwaresysmac_cp1e-e14sdr-a_firmwaresysmac_cp2e-n30dt1-dsysmac_cs1w-drm21-v1_firmwaresysmac_cp1l-em40dt-d_firmwaresysmac_cp1e-e30dr-a_firmwaresysmac_cp2e-n20dt-dsysmac_cj2m-cpu31_firmwaresysmac_cp1l-l10dr-d_firmwaresysmac_cp1l-l14dr-asysmac_cp1l-l10dt-d_firmwaresysmac_cp1e-na20dr-a_firmwaresysmac_cp1h-x40dt1-dsysmac_cp2e-n40dt-asysmac_cj2m-cpu35_firmwaresysmac_cj2h-cpu68sysmac_cp1l-m60dr-a_firmwaresysmac_cp1e-e20sdr-a_firmwaresysmac_cp1l-em40dr-dsysmac_cp1e-e40sdr-asysmac_cp1h-y20dt-dsysmac_cp1l-l10dt-a_firmwaresysmac_cp1h-xa40dr-a_firmwaresysmac_cj2m-cpu14sysmac_cp1h-x40dt-d_firmwaresysmac_cj2h-cpu68_firmwaresysmac_cj2h-cpu66sysmac_cs1w-spu02-v2sysmac_cp2e-n14dr-a_firmwaresysmac_cp1l-em30dt-d_firmwaresysmac_cp2e-n14dt1-d_firmwaresysmac_cp1l-el20dr-dsysmac_cp1l-l14dr-dsysmac_cs1w-etn21_firmwaresysmac_cp1e-e10dt1-dsysmac_cj2h-cpu68-eip_firmwaresysmac_cp1l-m40dr-d_firmwaresysmac_cp1l-m30dr-asysmac_cp1e-e10dr-dsysmac_cp2e-s30dt1-dsysmac_cp1l-l14dt-a_firmwaresysmac_cp1e-na20dr-asysmac_cp1l-em30dr-dsysmac_cj2m-cpu32sysmac_cp1e-e10dt1-asysmac_cp1e-e40sdr-a_firmwaresysmac_cp2e-n14dt-a_firmwaresysmac_cp1l-l20dr-dsysmac_cj2m-cpu14_firmwaresysmac_cj2h-cpu65-eip_firmwaresysmac_cj2m-cpu34sysmac_cp1e-e10dt1-a_firmwaresysmac_cj2h-cpu65-eipsysmac_cp2e-s60dr-asysmac_cp1e-e14dr-asysmac_cp2e-n14dt-d_firmwaresysmac_cp1l-em40dt1-dsysmac_cj2h-cpu65_firmwaresysmac_cp1e-e10dt-d_firmwaresysmac_cj2m-cpu33_firmwaresysmac_cj2h-cpu65sysmac_cp2e-n20dt-asysmac_cp1l-m30dt-a_firmwaresysmac_cp1l-l20dt-a_firmwaresysmac_cp2e-n20dt1-d_firmwaresysmac_cp2e-s40dr-a_firmwaresysmac_cp2e-n14dr-asysmac_cp1h-xa40dt1-d_firmwaresysmac_cj2m-cpu13sysmac_cp1l-m30dr-a_firmwaresysmac_cp2e-n40dt-a_firmwaresysmac_cp1l-em40dr-d_firmwaresysmac_cp1l-l20dt-asysmac_cp1l-m40dt-a_firmwaresysmac_cp1l-em40dt-dsysmac_cp2e-n30dr-asysmac_cp2e-s30dr-asysmac_cj2m-cpu34_firmwaresysmac_cp1l-m40dt1-d_firmwaresysmac_cp1l-l10dt1-dsysmac_cp2e-n14dr-d_firmwaresysmac_cj2m-cpu12_firmwaresysmac_cp1l-m60dt1-dsysmac_cp1e-e20sdr-asysmac_cp1e-e10dt1-d_firmwaresysmac_cp1e-e30sdr-a_firmwaresysmac_cp1l-l20dt-d_firmwaresysmac_cp1e-e20dr-asysmac_cp2e-n60dt-dsysmac_cj2h-cpu66_firmwaresysmac_cp1l-l10dr-a_firmwaresysmac_cp2e-s30dt-d_firmwaresysmac_cp2e-s60dt1-d_firmwaresysmac_cs1w-nc\[\]71_firmwaresysmac_cp2e-s40dr-asysmac_cp1e-na20dt-dsysmac_cp2e-n30dt-d_firmwaresysmac_cp2e-s40dt-d_firmwaresysmac_cp1e-e40dr-asysmac_cs1w-drm21-v1sysmac_cp1l-m40dr-asysmac_cp1e-e14sdr-asysmac_cp2e-s30dt1-d_firmwaresysmac_cj2h-cpu66-eipsysmac_cp1h-xa40dt-d_firmwaresysmac_cp2e-n20dt1-dsysmac_cs1w-spu01-v2_firmwaresysmac_cp2e-s40dt1-dsysmac_cp2e-n30dt-a_firmwaresysmac_cp2e-s60dr-a_firmwaresysmac_cp2e-n40dr-a_firmwaresysmac_cp1h-x40dr-asysmac_cp1l-l14dt-d_firmwaresysmac_cj2m-cpu11_firmwaresysmac_cp2e-e14dr-a_firmwaresysmac_cp1l-m40dt-d_firmwaresysmac_cj2h-cpu67sysmac_cp2e-n30dt-asysmac_cp1e-e40dr-a_firmwaresysmac_cp2e-n60dt-asysmac_cp2e-n20dr-dsysmac_cp1l-l14dt-asysmac_cs1w-spu01-v2sysmac_cp1e-e10dt-a_firmwaresysmac_cp2e-s30dr-a_firmwaresysmac_cs1w-eip21sysmac_cp1l-m40dr-a_firmwaresysmac_cp2e-n14dr-dsysmac_cp2e-n60dr-d_firmwaresysmac_cp2e-n40dr-d_firmwaresysmac_cp1l-m60dt-a_firmwaresysmac_cp2e-n60dt-a_firmwaresysmac_cj2m-cpu13_firmwaresysmac_cp2e-s60dt1-dsysmac_cj2m-cpu33sysmac_cp1l-m60dt-d_firmwaresysmac_cj2m-cpu35sysmac_cp1l-l20dr-asysmac_cj2h-cpu68-eipsysmac_cj2h-cpu64sysmac_cp1e-e10dt-dsysmac_cp2e-n14dt-dsysmac_cj2m-cpu11sysmac_cp1l-m60dr-dsysmac_cp2e-n40dt-dsysmac_cp2e-e20dr-asysmac_cs1w-etn21sysmac_cp2e-n14dt-asysmac_cp1h-x40dt1-d_firmwaresysmac_cp1l-m30dt-dsysmac_cp1e-e60sdr-asysmac_cp2e-n60dr-asysmac_cp1h-x40dt-dsysmac_cp1h-x40dr-a_firmwaresysmac_cj2h-cpu67_firmwaresysmac_cp2e-s40dt-dsysmac_cp1l-m30dt1-d_firmwaresysmac_cp1l-l20dt-dsysmac_cp1l-em40dt1-d_firmwaresysmac_cp1l-l10dr-dsysmac_cp2e-n20dr-a_firmwaresysmac_cp1l-em30dt1-d_firmwaresysmac_cj2h-cpu64-eip_firmwaresysmac_cj2m-cpu12sysmac_cp1h-xa40dr-asysmac_cp2e-e40dr-asysmac_cp1e-e60sdr-a_firmwaresysmac_cp1h-y20dt-d_firmwaresysmac_cp2e-n40dt-d_firmwaresysmac_cp2e-n60dr-dsysmac_cj2m-cpu31sysmac_cp1e-e10dt-asysmac_cp1l-em30dt-dsysmac_cp1l-l20dt1-d_firmwaresysmac_cp2e-e60dr-asysmac_cs1w-spu02-v2_firmwaresysmac_cp1l-l14dt1-d_firmwaresysmac_cp2e-n40dr-asysmac_cp1l-l10dt1-d_firmwaresysmac_cp1l-l14dt1-dsysmac_cp2e-e60dr-a_firmwaresysmac_cp2e-n60dt-d_firmwaresysmac_cp1e-e30dr-asysmac_cp1e-e14dr-a_firmwaresysmac_cp1e-e10dr-asysmac_cp1e-e20dr-a_firmwaresysmac_cp1l-m30dt1-dsysmac_cp1l-m30dt-d_firmwaresysmac_cp2e-n30dr-a_firmwaresysmac_cp2e-n20dr-d_firmwaresysmac_cp1l-l14dr-a_firmwaresysmac_cp1l-m60dr-asysmac_cs1w-fln22sysmac_cp2e-n14dt1-dsysmac_cp1l-m30dt-asysmac_cj2h-cpu66-eip_firmwaresysmac_cp1l-l20dr-d_firmwaresysmac_cj2m-cpu15_firmwaresysmac_cp2e-s60dt-dsysmac_cp2e-n60dt1-d_firmwaresysmac_cp1l-m40dt-dsysmac_cp2e-n60dr-a_firmwaresysmac_cp2e-e20dr-a_firmwaresysmac_cp1l-em30dt1-dsysmac_cp1e-e10dr-a_firmwaresysmac_cp2e-e30dr-asysmac_cp1e-na20dt1-dsysmac_cp1e-e10dr-d_firmwaresysmac_cp2e-n30dt-dsysmac_cp1l-l10dr-asysmac_cp1l-l14dr-d_firmwaresysmac_cp1l-el20dr-d_firmwaresysmac_cp2e-s40dt1-d_firmwaresysmac_cp2e-n20dt-d_firmwaresysmac_cp1l-m30dr-dsysmac_cs1w-nc\[\]71sysmac_cp1h-xa40dt1-dsysmac_cp1l-l20dt1-dsysmac_cp1e-na20dt1-d_firmwaresysmac_cp1e-e30sdr-asysmac_cp1l-m60dr-d_firmwaresysmac_cp2e-n20dt-a_firmwaresysmac_cp1h-xa40dt-dsysmac_cp1l-m40dt1-dsysmac_cp1l-l20dr-a_firmwareCJ1M SYSMAC CJ-seriesCJ1M SYSMAC CP-seriesCJ1M SYSMAC CS-series
CWE ID-CWE-284
Improper Access Control
CVE-2022-27134
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.21% / 86.52%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 22:56
Updated-03 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EOSIO batdappboomx v327c04cf has an Access-control vulnerability in the `transfer` function of the smart contract which allows remote attackers to win the cryptocurrency without paying ticket fee via the `std::string memo` parameter.

Action-Not Available
Vendor-b1n/a
Product-eosio_batdappboomxn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-24486
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.80% / 73.02%
||
7 Day CHG~0.00%
Published-15 Apr, 2024 | 00:00
Updated-01 Aug, 2024 | 23:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue discovered in silex technology DS-600 Firmware v.1.4.1 allows a remote attacker to edit device settings via the SAVE EEP_DATA command.

Action-Not Available
Vendor-n/asilex
Product-n/ads-600_firmware
CWE ID-CWE-284
Improper Access Control
CVE-2022-48508
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.76%
||
7 Day CHG~0.00%
Published-06 Jul, 2023 | 12:21
Updated-21 Nov, 2024 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inappropriate authorization vulnerability in the system apps. Successful exploitation of this vulnerability may affect service integrity.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosHarmonyOSEMUI
CWE ID-CWE-264
Not Available
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-22187
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.1||CRITICAL
EPSS-0.86% / 74.10%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A write-what-where vulnerability exists in the Programming Software Connection Remote Memory Diagnostics functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to an arbitrary write. An attacker can send an unauthenticated packet to trigger this vulnerability.

Action-Not Available
Vendor-AutomationDirect
Product-p1-540_firmwarep3-550e_firmwarep3-550_firmwarep3-530p1-550_firmwarep2-550p3-550ep3-550p2-550_firmwarep1-540p3-530_firmwarep1-550P3-550Ep3-550e
CWE ID-CWE-284
Improper Access Control
CVE-2024-20932
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-0.13% / 32.65%
||
7 Day CHG~0.00%
Published-16 Jan, 2024 | 21:41
Updated-13 Feb, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 17.0.9; Oracle GraalVM for JDK: 17.0.9; Oracle GraalVM Enterprise Edition: 21.3.8 and 22.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

Action-Not Available
Vendor-Oracle CorporationNetApp, Inc.
Product-graalvmcloud_insights_storage_workload_security_agentjrecloud_insights_acquisition_unitjdkgraalvm_for_jdkoncommand_insightJava SE JDK and JRE
CWE ID-CWE-284
Improper Access Control
CVE-2024-13200
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.07% / 20.52%
||
7 Day CHG-0.04%
Published-09 Jan, 2025 | 01:00
Updated-22 Aug, 2025 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wander-chu SpringBoot-Blog HTTP POST Request BaseInterceptor.java preHandle access control

A vulnerability, which was classified as critical, was found in wander-chu SpringBoot-Blog 1.0. This affects the function preHandle of the file src/main/java/com/my/blog/website/interceptor/BaseInterceptor.java of the component HTTP POST Request Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-wander-chuwander-chu
Product-springboot-blogSpringBoot-Blog
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-284
Improper Access Control
CVE-2024-13253
Matching Score-4
Assigner-Drupal.org
ShareView Details
Matching Score-4
Assigner-Drupal.org
CVSS Score-9.1||CRITICAL
EPSS-0.13% / 33.15%
||
7 Day CHG~0.00%
Published-09 Jan, 2025 | 18:59
Updated-04 Jun, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Advanced PWA - Critical - Access bypass - SA-CONTRIB-2024-017

Incorrect Authorization vulnerability in Drupal Advanced PWA inc Push Notifications allows Forceful Browsing.This issue affects Advanced PWA inc Push Notifications: from 0.0.0 before 1.5.0.

Action-Not Available
Vendor-advanced_pwa_inc_push_notifications_projectThe Drupal Association
Product-advanced_pwa_inc_push_notificationsAdvanced PWA inc Push Notifications
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-36913
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.24%
||
7 Day CHG~0.00%
Published-11 Oct, 2022 | 17:04
Updated-20 Feb, 2025 | 19:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Redirection for Contact Form 7 <= 2.4.0 - Unauthenticated Options Change and Content Injection vulnerability

Unauthenticated Options Change and Content Injection vulnerability in Qube One Redirection for Contact Form 7 plugin <= 2.4.0 at WordPress allows attackers to change options and inject scripts into the footer HTML. Requires an additional extension (plugin) AccessiBe.

Action-Not Available
Vendor-redirection-for-contact-form7Qube One
Product-redirection_for_contact_form_7Redirection for Contact Form 7 (WordPress plugin)
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2021-35197
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.00% / 76.08%
||
7 Day CHG~0.00%
Published-02 Jul, 2021 | 12:28
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In MediaWiki before 1.31.15, 1.32.x through 1.35.x before 1.35.3, and 1.36.x before 1.36.1, bots have certain unintended API access. When a bot account has a "sitewide block" applied, it is able to still "purge" pages through the MediaWiki Action API (which a "sitewide block" should have prevented).

Action-Not Available
Vendor-n/aDebian GNU/LinuxWikimedia FoundationFedora Project
Product-debian_linuxmediawikifedoran/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-46331
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.11% / 30.04%
||
7 Day CHG~0.00%
Published-17 Jan, 2023 | 23:49
Updated-07 Nov, 2023 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unauthorized user could possibly delete any file on the system.

Action-Not Available
Vendor-geGE Digital
Product-proficy_historianProficy Historian
CWE ID-CWE-284
Improper Access Control
CVE-2018-19945
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.40% / 59.80%
||
7 Day CHG~0.00%
Published-31 Dec, 2020 | 16:33
Updated-17 Sep, 2024 | 02:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Limitation of a Pathname to a Restricted Directory in QTS

A vulnerability has been reported to affect earlier QNAP devices running QTS 4.3.4 to 4.3.6. Caused by improper limitations of a pathname to a restricted directory, this vulnerability allows for renaming arbitrary files on the target system, if exploited. QNAP have already fixed this vulnerability in the following versions: QTS 4.3.6.0895 build 20190328 (and later) QTS 4.3.4.0899 build 20190322 (and later) This issue does not affect QTS 4.4.x or QTS 4.5.x.

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qtsQTS
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-73
External Control of File Name or Path
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-20
Improper Input Validation
CVE-2023-5454
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-0.30% / 53.12%
||
7 Day CHG~0.00%
Published-06 Nov, 2023 | 20:40
Updated-26 Feb, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Templately < 2.2.6 - Arbitrary post trashing via Missing Authorization

The Templately WordPress plugin before 2.2.6 does not properly authorize the `saved-templates/delete` REST API call, allowing unauthenticated users to delete arbitrary posts.

Action-Not Available
Vendor-UnknownTemplately
Product-templatelyTemplately
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-284
Improper Access Control
CVE-2023-52114
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.76%
||
7 Day CHG~0.00%
Published-16 Jan, 2024 | 08:21
Updated-27 Aug, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Data confidentiality vulnerability in the ScreenReader module. Successful exploitation of this vulnerability may affect service integrity.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosHarmonyOSEMUIemuiharmonyos
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-284
Improper Access Control
CVE-2023-52801
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-9.1||CRITICAL
EPSS-0.41% / 60.34%
||
7 Day CHG~0.00%
Published-21 May, 2024 | 15:31
Updated-04 May, 2025 | 07:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iommufd: Fix missing update of domains_itree after splitting iopt_area

In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix missing update of domains_itree after splitting iopt_area In iopt_area_split(), if the original iopt_area has filled a domain and is linked to domains_itree, pages_nodes have to be properly reinserted. Otherwise the domains_itree becomes corrupted and we will UAF.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinuxlinux_kernel
CWE ID-CWE-284
Improper Access Control
CVE-2023-52111
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.76%
||
7 Day CHG~0.00%
Published-16 Jan, 2024 | 07:55
Updated-11 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authorization vulnerability in the BootLoader module. Successful exploitation of this vulnerability may affect service integrity.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosHarmonyOSEMUI
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-5106
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-8.2||HIGH
EPSS-0.03% / 6.89%
||
7 Day CHG~0.00%
Published-02 Oct, 2023 | 11:49
Updated-05 Oct, 2024 | 04:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in GitLab

An issue has been discovered in Ultimate-licensed GitLab EE affecting all versions starting 13.12 prior to 16.2.8, 16.3.0 prior to 16.3.5, and 16.4.0 prior to 16.4.1 that could allow an attacker to impersonate users in CI pipelines through direct transfer group imports.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-51070
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.30% / 53.12%
||
7 Day CHG~0.00%
Published-13 Jan, 2024 | 00:00
Updated-30 Aug, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An access control issue in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to arbitrarily adjust sensitive SMB settings on the QStar Server.

Action-Not Available
Vendor-qstarn/a
Product-archive_storage_managern/a
CWE ID-CWE-284
Improper Access Control
CVE-2023-47827
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 35.45%
||
7 Day CHG~0.00%
Published-30 Nov, 2023 | 13:31
Updated-01 Oct, 2024 | 14:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Events Addon for Elementor Plugin <= 2.1.3 is vulnerable to Broken Access Control

Incorrect Authorization vulnerability in NicheAddons Events Addon for Elementor allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Events Addon for Elementor: from n/a through 2.1.3.

Action-Not Available
Vendor-nicheaddonsNicheAddons
Product-events_addon_for_elementorEvents Addon for Elementor
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-29628
Matching Score-4
Assigner-FreeBSD
ShareView Details
Matching Score-4
Assigner-FreeBSD
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.08%
||
7 Day CHG~0.00%
Published-28 May, 2021 | 14:06
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 13.0-STABLE before n245764-876ffe28796c, 12.2-STABLE before r369857, 13.0-RELEASE before p1, and 12.2-RELEASE before p7, a system call triggering a fault could cause SMAP protections to be disabled for the duration of the system call. This weakness could be combined with other kernel bugs to craft an exploit.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-13382
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-9.1||CRITICAL
EPSS-87.79% / 99.44%
||
7 Day CHG~0.00%
Published-04 Jun, 2019 | 20:33
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-07-10||Apply updates per vendor instructions.

An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiproxyfortiosFortinet FortiOS, FortiProxyFortiOS and FortiProxy
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-46992
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.25%
||
7 Day CHG~0.00%
Published-31 Oct, 2023 | 00:00
Updated-28 Oct, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLINK A3300R V17.0.0cu.557_B20221024 is vulnerable to Incorrect Access Control. Attackers are able to reset serveral critical passwords without authentication by visiting specific pages.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a3300ra3300r_firmwaren/aa3300r_firmware
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-28504
Matching Score-4
Assigner-Arista Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Arista Networks, Inc.
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.33%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-03 Aug, 2024 | 21:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
On Arista Strata family products which have “TCAM profile” feature enabled when Port IPv4 access-list has a rule which matches on “vxlan” as protocol then that rule and subsequent rules ( rules declared after it in ACL ) do not match on IP protocol fi ...

On Arista Strata family products which have “TCAM profile” feature enabled when Port IPv4 access-list has a rule which matches on “vxlan” as protocol then that rule and subsequent rules ( rules declared after it in ACL ) do not match on IP protocol field as expected.

Action-Not Available
Vendor-Arista Networks, Inc.
Product-ccs-720xp-24zy4dcs-7050sx3-96yc8ccs-710p-12ccs-720xp-48y6dcs-7050cx3m-32sccs-722xpm-48zy8dcs-7050tx3-48c8ccs-720xp-24y6ccs-722xpm-48y4ccs-720xp-48zc2dcs-7010tx-48dcs-7050cx3-32sdcs-7050sx3-48yc12dcs-7050sx3-48yc8ccs-710p-16pdcs-7050sx3-48c8eosccs-720xp-96zc2EOS
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-44932
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.35%
||
7 Day CHG~0.00%
Published-08 Dec, 2022 | 00:00
Updated-23 Apr, 2025 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An access control issue in Tenda A18 v15.13.07.09 allows unauthenticated attackers to access the Telnet service.

Action-Not Available
Vendor-n/aTenda Technology Co., Ltd.
Product-a18a18_firmwaren/a
CWE ID-CWE-284
Improper Access Control
CVE-2023-4379
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-8.1||HIGH
EPSS-0.01% / 1.20%
||
7 Day CHG~0.00%
Published-09 Nov, 2023 | 21:01
Updated-03 Oct, 2024 | 07:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in GitLab

An issue has been discovered in GitLab EE affecting all versions starting from 15.3 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Code owner approval was not removed from merge requests when the target branch was updated.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-44031
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.24%
||
7 Day CHG~0.00%
Published-03 Feb, 2024 | 00:00
Updated-30 Apr, 2025 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect access control in Reprise License Management Software Reprise License Manager v15.1 allows attackers to arbitrarily save sensitive files in insecure locations via a crafted POST request.

Action-Not Available
Vendor-reprisesoftwaren/areprise
Product-reprise_license_managern/alicense_manager
CWE ID-CWE-284
Improper Access Control
CVE-2021-28505
Matching Score-4
Assigner-Arista Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Arista Networks, Inc.
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.59%
||
7 Day CHG~0.00%
Published-14 Apr, 2022 | 20:05
Updated-16 Sep, 2024 | 16:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.

On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.

Action-Not Available
Vendor-Arista Networks, Inc.
Product-ccs-720xp-24zy4dcs-7050sx3-96yc8ccs-710p-12ccs-720xp-48y6dcs-7050cx3m-32sccs-722xpm-48zy8dcs-7050tx3-48c8ccs-720xp-24y6ccs-722xpm-48y4ccs-720xp-48zc2dcs-7010tx-48dcs-7050cx3-32sdcs-7050sx3-48yc12dcs-7050sx3-48yc8ccs-710p-16pdcs-7050sx3-48c8eosccs-720xp-96zc2EOS
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-26118
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-1.01% / 76.16%
||
7 Day CHG~0.00%
Published-27 Jan, 2021 | 18:55
Updated-13 Feb, 2025 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Flaw in ActiveMQ Artemis OpenWire support

While investigating ARTEMIS-2964 it was found that the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 bypassed policy based access control for the entire session. Production of advisory messages was not subject to access control in error.

Action-Not Available
Vendor-NetApp, Inc.The Apache Software Foundation
Product-activemq_artemisoncommand_workflow_automationApache ActiveMQ Artemis
CWE ID-CWE-284
Improper Access Control
CVE-2021-26040
Matching Score-4
Assigner-Joomla! Project
ShareView Details
Matching Score-4
Assigner-Joomla! Project
CVSS Score-9.1||CRITICAL
EPSS-0.01% / 0.28%
||
7 Day CHG~0.00%
Published-24 Aug, 2021 | 14:20
Updated-17 Sep, 2024 | 03:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
[20210801] - Core - Insufficient access control for com_media deletion endpoint

An issue was discovered in Joomla! 4.0.0. The media manager does not correctly check the user's permissions before executing a file deletion command.

Action-Not Available
Vendor-Joomla!
Product-joomla\!Joomla! CMS
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-24916
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-3.35% / 86.80%
||
7 Day CHG~0.00%
Published-07 Aug, 2023 | 14:31
Updated-15 Oct, 2024 | 18:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qubely < 1.8.6 - Unauthenticated Arbitrary E-mail Sending

The Qubely WordPress plugin before 1.8.6 allows unauthenticated user to send arbitrary e-mails to arbitrary addresses via the qubely_send_form_data AJAX action.

Action-Not Available
Vendor-UnknownThemeum
Product-qubelyQubely
CWE ID-CWE-284
Improper Access Control
CVE-2021-24146
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-85.04% / 99.30%
||
7 Day CHG~0.00%
Published-18 Mar, 2021 | 14:57
Updated-03 Aug, 2024 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Modern Events Calendar Lite < 5.16.5 - Unauthenticated Events Export

Lack of authorisation checks in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly restrict access to the export files, allowing unauthenticated users to exports all events data in CSV or XML format for example.

Action-Not Available
Vendor-webnusUnknown
Product-modern_events_calendar_liteModern Events Calendar Lite
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-862
Missing Authorization
CVE-2025-25500
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.43% / 61.69%
||
7 Day CHG~0.00%
Published-18 Mar, 2025 | 00:00
Updated-22 May, 2025 | 19:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in CosmWasm prior to v2.2.0 allows attackers to bypass capability restrictions in blockchains by exploiting a lack of runtime capability validation. This allows attackers to deploy a contract without capability enforcement, and execute unauthorized actions on the blockchain.

Action-Not Available
Vendor-cosmwasmn/a
Product-cosmwasmn/a
CWE ID-CWE-284
Improper Access Control
CVE-2021-23178
Matching Score-4
Assigner-Odoo
ShareView Details
Matching Score-4
Assigner-Odoo
CVSS Score-7.5||HIGH
EPSS-0.26% / 48.88%
||
7 Day CHG-0.08%
Published-25 Apr, 2023 | 18:33
Updated-03 Aug, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows attackers to validate online payments with a tokenized payment method that belongs to another user, causing the victim's payment method to be charged instead.

Action-Not Available
Vendor-odooOdooodoo
Product-odooOdoo CommunityOdoo Enterpriseodoo_communityodoo_enterprise
CWE ID-CWE-284
Improper Access Control
CVE-2021-22209
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 40.62%
||
7 Day CHG~0.00%
Published-06 May, 2021 | 13:37
Updated-03 Aug, 2024 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.8. GitLab was not properly validating authorisation tokens which resulted in GraphQL mutation being executed.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-49947
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.92%
||
7 Day CHG~0.00%
Published-03 Dec, 2023 | 00:00
Updated-02 Aug, 2024 | 22:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Forgejo before 1.20.5-1 allows 2FA bypass when docker login uses Basic Authentication.

Action-Not Available
Vendor-forgejon/a
Product-forgejon/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-1581
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-3.00% / 86.04%
||
7 Day CHG~0.00%
Published-25 Aug, 2021 | 19:10
Updated-07 Nov, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities

Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow a remote attacker to perform a command injection or file upload attack on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-application_policy_infrastructure_controllercloud_application_policy_infrastructure_controllerCisco Application Policy Infrastructure Controller (APIC)
CWE ID-CWE-284
Improper Access Control
CVE-2022-41574
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.18% / 39.62%
||
7 Day CHG~0.00%
Published-07 Oct, 2022 | 00:00
Updated-03 Aug, 2024 | 12:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An access-control vulnerability in Gradle Enterprise 2022.4 through 2022.3.1 allows remote attackers to prevent backups from occurring, and send emails with arbitrary text content to the configured installation-administrator contact address, via HTTP access to an accidentally exposed internal endpoint. This is fixed in 2022.3.2.

Action-Not Available
Vendor-n/aGradle, Inc.
Product-enterprisen/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-0744
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.35%
||
7 Day CHG~0.00%
Published-30 Jan, 2025 | 11:17
Updated-18 Feb, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control vulnerability in EmbedAI

an Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker change his subscription plan without paying by making a POST request changing the parameters of the "/demos/embedai/pmt_cash_on_delivery/pay" endpoint.

Action-Not Available
Vendor-EmbedAI (Vadoo Internet Services Private Limited)
Product-EmbedAI
CWE ID-CWE-284
Improper Access Control
CVE-2022-39337
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.58%
||
7 Day CHG~0.00%
Published-22 Dec, 2023 | 15:06
Updated-28 Aug, 2024 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Permission bypass due to incorrect configuration in github.com/dromara/hertzbeat

Hertzbeat is an open source, real-time monitoring system with custom-monitoring, high performance cluster, prometheus-like and agentless. Hertzbeat versions 1.20 and prior have a permission bypass vulnerability. System authentication can be bypassed and invoke interfaces without authorization. Version 1.2.1 contains a patch for this issue.

Action-Not Available
Vendor-dromaraThe Apache Software Foundation
Product-hertzbeathertzbeat
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-284
Improper Access Control
CVE-2020-9381
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.54% / 84.89%
||
7 Day CHG~0.00%
Published-24 Feb, 2020 | 21:25
Updated-04 Aug, 2024 | 10:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

controllers/admin.js in Total.js CMS 13 allows remote attackers to execute arbitrary code via a POST to the /admin/api/widgets/ URI. This can be exploited in conjunction with CVE-2019-15954.

Action-Not Available
Vendor-totaljsn/a
Product-total.js_cmsn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-32783
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.16% / 37.55%
||
7 Day CHG~0.00%
Published-07 Aug, 2023 | 00:00
Updated-15 Oct, 2024 | 20:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The event analysis component in Zoho ManageEngine ADAudit Plus 7.1.1 allows an attacker to bypass audit detection by creating or renaming user accounts with a "$" symbol suffix. NOTE: the vendor states "We do not consider this as a security bug and it's an expected behaviour."

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.Microsoft Corporation
Product-windowsmanageengine_adaudit_plusn/amanageengine_adaudit_plus
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-7154
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 25.34%
||
7 Day CHG~0.00%
Published-28 Jul, 2024 | 09:31
Updated-08 Aug, 2024 | 12:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TOTOLINK A3700R Password Reset wizard.html access control

A vulnerability, which was classified as problematic, was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. Affected is an unknown function of the file /wizard.html of the component Password Reset Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272568. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-TOTOLINK
Product-a3700ra3700r_firmwareA3700Ra3700r_firmware
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-0356
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.3||MEDIUM
EPSS-0.06% / 20.05%
||
7 Day CHG~0.00%
Published-10 Jan, 2024 | 00:00
Updated-03 Jun, 2025 | 14:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mandelo ssm_shiro_blog Backend updateRoles access control

A vulnerability has been found in Mandelo ssm_shiro_blog 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file updateRoles of the component Backend. The manipulation leads to improper access controls. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250123.

Action-Not Available
Vendor-mandeloMandelo
Product-ssm_shiro_blogssm_shiro_blog
CWE ID-CWE-284
Improper Access Control
CVE-2012-2238
Matching Score-4
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-4
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-0.35% / 56.90%
||
7 Day CHG~0.00%
Published-21 Nov, 2019 | 13:47
Updated-06 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

trytond 2.4: ModelView.button fails to validate authorization

Action-Not Available
Vendor-trytontryton
Product-trytondtrytond
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-32219
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 17.24%
||
7 Day CHG~0.00%
Published-12 Jun, 2023 | 00:00
Updated-06 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mazda cars unlocking

A Mazda model (2015-2016) can be unlocked via an unspecified method.

Action-Not Available
Vendor-mazdaMazda
Product-mazda_firmwaremazdaMazda (2015-2016)
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-8806
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.73%
||
7 Day CHG~0.00%
Published-05 Feb, 2021 | 09:08
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Electric Coin Company Zcashd before 2.1.1-1 allows attackers to trigger consensus failure and double spending. A valid chain could be incorrectly rejected because timestamp requirements on block headers were not properly enforced.

Action-Not Available
Vendor-electriccoinn/a
Product-zcashdn/a
CWE ID-CWE-863
Incorrect Authorization
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found