Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Permission Issues
Category ID:275
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
2051Vulnerabilities found

CVE-2026-34744
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-Not Assigned
Published-19 May, 2026 | 22:45
Updated-19 May, 2026 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MantisBT authorization bypass allows continued access to self-uploaded attachments on private issues

Mantis Bug Tracker (MantisBT) is an open source issue tracker. Versions 2.28.1 and prior permit a user to list and download their own attachments from an Issue created by another user even after it becomes private, bypassing read access revocation. The loss of confidentiality caused by this vulnerability is minimal, considering that only attachments previously uploaded by the user themselves remain accessible. This issue has been fixed in version 2.82.2.

Action-Not Available
Vendor-Mantis Bug Tracker (MantisBT)
Product-mantisbt
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2026-34600
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.7||MEDIUM
EPSS-Not Assigned
Published-19 May, 2026 | 22:28
Updated-19 May, 2026 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Joplin Server delta API returns note content after share access is revoked

Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions 3.5.2 and prior contain a logic error in the delta API that allows share recipients to download notes that are no longer shared with them, related to but not fully fixed by the prior patch in #14289. In ChangeModel.delta, when DELTA_INCLUDES_ITEMS is enabled (the default), the latest state of items is attached to delta output without verifying that those items are still shared with the requesting user, and the existing removal logic only filters items deleted for all users. Additionally, the change compression logic incorrectly reduces create - delete to NOOP, which is unsafe because compression is applied per page and an item can have multiple create events; if an earlier create falls on a separate page from a later create -> delete pair, the deletion is dropped and the sequence collapses to a create. As a result, the delta API returns a create event for a deleted item with the full latest content attached, exposing notes the user no longer has access to. This issue has been fixed in version 3.5.3.

Action-Not Available
Vendor-laurent22
Product-joplin
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-281
Improper Preservation of Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2026-47107
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-Not Assigned
Published-19 May, 2026 | 16:42
Updated-19 May, 2026 | 21:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windmill < 1.703.2 Incorrect Default Permissions in nsjail Configuration

Windmill prior to 1.703.2 contains an incorrect default permissions vulnerability in nsjail sandbox configuration files where /etc is bind-mounted without read-write restrictions, allowing authenticated users to write arbitrary entries to /etc/hosts, /etc/resolv.conf, and /etc/ssl/certs/ca-certificates.crt from within script execution sandboxes. Attackers can exploit persistent poisoned entries across all subsequent script executions on the same worker pod to redirect hostnames, intercept DNS queries, perform transparent HTTPS man-in-the-middle attacks, and intercept WM_TOKEN JWTs to gain workspace-admin access to victim workspaces across tenants.

Action-Not Available
Vendor-windmill-labs
Product-windmill
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-25850
Assigner-OpenHarmony
ShareView Details
Assigner-OpenHarmony
CVSS Score-5.5||MEDIUM
EPSS-Not Assigned
Published-19 May, 2026 | 03:08
Updated-19 May, 2026 | 12:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
filemanagement_storage_service has an improper preservation of permissions vulnerability

in OpenHarmony v6.0 and prior versions allow a local attacker cause information leak

Action-Not Available
Vendor-OpenHarmony (OpenAtom Foundation)
Product-OpenHarmony
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2025-48516
Assigner-Advanced Micro Devices Inc.
ShareView Details
Assigner-Advanced Micro Devices Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.01% / 2.13%
||
7 Day CHG~0.00%
Published-15 May, 2026 | 02:37
Updated-15 May, 2026 | 16:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure default configuration state of DDR5 memory module by AGESA Bootloader Firmware could allow an attacker with local user privilege to abuse the unprotected PMIC interface to create a permanent denial of service condition or affect the integrity of the memory module.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ Z2 Series ProcessorsAMD Ryzen™ Threadripper™ PRO 5000 WX-Series ProcessorsAMD Ryzen™ 7020 Series Processors with Radeon™ GraphicsAMD Ryzen™ Threadripper™ PRO 9000 WX-Series ProcessorsAMD Ryzen™ 4000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 8040 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 5000 Series Desktop Processors with Radeon™ GraphicsAMD Ryzen™ Z1 Series ProcessorsAMD Ryzen™ 3000 Series Desktop ProcessorsAMD Ryzen™ Threadripper™ PRO 7000 WX-Series ProcessorsAMD Ryzen™ 7045 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 5000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ Z2 Series Processors ExtremeAMD Ryzen™ 4000 Series Desktop ProcessorsAMD Ryzen™ 7040 Series Mobile Processors with Radeon™ GraphicsAMD Athlon™ 3000 Series Desktop Processors with Radeon™ GraphicsAMD Ryzen™ AI Max 300 Series ProcessorsAMD Ryzen™ Threadripper™ PRO 3000 WX-Series ProcessorsAMD Ryzen™ 7035 Series Processors with Radeon™ GraphicsAMD Ryzen™ Threadripper™ 7000 ProcessorsAMD Ryzen™ 7030 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ Threadripper™ 3000 ProcessorsAMD Ryzen™ 6000 Series Processors with Radeon™ GraphicsAMD Ryzen™ Threadripper™ 9000 ProcessorsAMD Ryzen™ 7000 Series Desktop ProcessorsAMD Ryzen™ 5000 Series Desktop ProcessorsAMD Ryzen™ AI 300 Series ProcessorsAMD Ryzen™ Z2 Series Processors GoAMD Athlon™ 3000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 9000 Series Desktop ProcessorsAMD Ryzen™ 9000HX Series ProcessorsAMD Ryzen™ 8000 Series Desktop Processors
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-0432
Assigner-Advanced Micro Devices Inc.
ShareView Details
Assigner-Advanced Micro Devices Inc.
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.56%
||
7 Day CHG~0.00%
Published-15 May, 2026 | 01:46
Updated-16 May, 2026 | 03:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installation directory for the AMD chipset driver could allow an attacker to achieve privilege escalation resulting in arbitrary code execution.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD EPYC™ 8004 Series ProcessorsAMD EPYC™ 7001 Series ProcessorsAMD Instinct™ MI300A Series ProcessorsAMD Ryzen™ Threadripper™ PRO 5000 WX-Series ProcessorsAMD Ryzen™ AI 400 Series ProcessorsAMD EPYC™ 9V64H ProcessorAMD Ryzen™ 7020 Series Processors with Radeon™ GraphicsAMD EPYC™ 9005 Series ProcessorsAMD Ryzen™ 4000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 8040 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 5000 Series Desktop Processors with Radeon™ GraphicsAMD EPYC™ 7003 Series ProcessorsAMD Ryzen™ Threadripper™ 7000 ProcessorsAMD Ryzen™ 3000 Series Desktop ProcessorsAMD Ryzen™ Threadripper™ PRO 7000 WX-Series ProcessorsAMD Ryzen™ Embedded 9000 Series ProcessorsAMD Ryzen™ 7045 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 5000 Series Mobile Processors with Radeon™ GraphicsAMD EPYC™ Embedded 8004 Series ProcessorsAMD Ryzen™ Embedded R2000 Series ProcessorsAMD Ryzen™ 4000 Series Desktop ProcessorsAMD Ryzen™ 7040 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ Embedded R1000 Series ProcessorsAMD Athlon™ 3000 Series Desktop Processors with Radeon™ GraphicsAMD EPYC™ 7002 Series ProcessorsAMD EPYC™ 9004 Series ProcessorsAMD Ryzen™ AI Max 300 Series ProcessorsAMD Ryzen™ Threadripper™ PRO 3000 WX-Series ProcessorsAMD Ryzen™ 7035 Series Processors with Radeon™ GraphicsAMD Ryzen™ Embedded 7000 Series ProcessorsAMD Ryzen™ Embedded 8000 Series ProcessorsAMD Ryzen™ Embedded V2000 Series ProcessorsAMD Ryzen™ 7030 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ Threadripper™ 3000 ProcessorsAMD Ryzen™ 6000 Series Processors with Radeon™ GraphicsAMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Raven Ridge")AMD Ryzen™ 7000 Series Desktop ProcessorsAMD Ryzen™ 5000 Series Desktop ProcessorsAMD Ryzen™ AI 300 Series ProcessorsAMD EPYC™ 4005 Series ProcessorsAMD EPYC™ Embedded 9005 Series ProcessorsAMD Athlon™ 3000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 9000 Series Desktop ProcessorsAMD EPYC™ 4004 Series ProcessorsAMD Ryzen™ 9000HX Series ProcessorsAMD Ryzen™ 8000 Series Desktop Processors
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-48512
Assigner-Advanced Micro Devices Inc.
ShareView Details
Assigner-Advanced Micro Devices Inc.
CVSS Score-7||HIGH
EPSS-0.01% / 1.56%
||
7 Day CHG~0.00%
Published-15 May, 2026 | 01:45
Updated-16 May, 2026 | 03:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installation directory for the AMD general-purpose input/output controller (GPIO) could allow an attacker to achieve privilege escalation resulting in arbitrary code execution.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD EPYC™ 8004 Series ProcessorsAMD EPYC™ 7001 Series ProcessorsAMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dragon Range")AMD Ryzen™ 8000 Series Desktop Processors (formerly codenamed "Phoenix")AMD Instinct™ MI300A Series ProcessorsAMD Ryzen™ 5000 Series Desktop Processors (formerly codenamed "Vermeer")AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics (formerly codenamed "Picasso")AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Hawk Point")AMD EPYC™ 9V64H ProcessorAMD Ryzen™ 4000 Series Desktop Processors (formerly codenamed "Renoir")AMD EPYC™ 9005 Series ProcessorsAMD EPYC™ 7003 Series ProcessorsAMD Ryzen™ Threadripper™ PRO 3000 WX-Series Processors (formerly codenamed "Castle Peak")AMD Ryzen™ Z1 Series ProcessorsAMD Ryzen™ 6000 Series Processors with Radeon™ Graphics (formerly codenamed "Rembrandt")AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Renoir")AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Barcelo")AMD Ryzen™ Embedded 9000 Series ProcessorsAMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Barcelo R")AMD Ryzen™ 3000 Series Desktop Processors (formerly codenamed "Matisse")AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dali")AMD EPYC™ Embedded 8004 Series ProcessorsAMD Ryzen™ Threadripper™ PRO 5000 WX-Series Processors (formerly codenamed "Chagall")AMD Ryzen™ Embedded R2000 Series ProcessorsAMD Ryzen™ Embedded R1000 Series ProcessorsAMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Picasso")AMD EPYC™ 7002 Series ProcessorsAMD EPYC™ 9004 Series ProcessorsAMD Ryzen™ AI Max 300 Series ProcessorsAMD Ryzen™ Embedded 7000 Series ProcessorsAMD Ryzen™ AI 300 Series Processors (formerly codenamed "Strix Point")AMD Ryzen™ 7000 Series Desktop Processors (formerly codenamed "Raphael"/"Raphael-X3D")AMD Ryzen™ Embedded 8000 Series ProcessorsAMD Ryzen™ 7035 Series Processors with Radeon™ Graphics (formerly codenamed "Rembrandt R")AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics (formerly codenamed "Mendocino")AMD Ryzen™ Embedded V2000 Series ProcessorsAMD Ryzen™ 5000 Series Desktop Processors (formerly codenamed "Vermeer"/"Vermeer-X3D")AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics (formerly codenamed "Cezanne")AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dali")AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Raven Ridge")AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Phoenix")AMD Ryzen™ 7000 Series Desktop Processors (formerly codenamed "Raphael"/"Raphael X3D")AMD Ryzen™ Threadripper™ PRO 7000 WX-Series Processors (formerly codenamed "Storm Peak")AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Lucienne")AMD EPYC™ 4005 Series ProcessorsAMD EPYC™ Embedded 9005 Series ProcessorsAMD Ryzen™ Threadripper™ 3000 Processors (formerly codenamed "Castle Peak")AMD EPYC™ 4004 Series ProcessorsAMD Ryzen™ 9000HX Series ProcessorsAMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Cezanne")AMD Ryzen™ 9000 Series Desktop Processors (formerly codenamed "Granite Ridge")AMD Ryzen™ Threadripper™ 7000 Processors (formerly codenamed "Storm Peak")
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-27680
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-3.1||LOW
EPSS-0.03% / 8.18%
||
7 Day CHG~0.00%
Published-14 May, 2026 | 18:33
Updated-15 May, 2026 | 14:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CSS Injection vulnerability in SAP NetWeaver Application Server ABAP

Due to improper input handling under certain conditions, SAP NetWeaver Application Server ABAP allows an attacker to inject custom Cascading Style Sheets (CSS) data into a web page served by the application. When a user accesses or clicks the affected page, the injected CSS is executed. As a result, the issue has a low impact on confidentiality, while integrity and availability are not impacted.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver Application Server ABAP
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-21015
Assigner-Samsung Mobile
ShareView Details
Assigner-Samsung Mobile
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 1.01%
||
7 Day CHG~0.00%
Published-13 May, 2026 | 04:56
Updated-13 May, 2026 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in FactoryCamera prior to SMR May-2026 Release 1 allows local attacker to access unique identifier.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-androidSamsung Mobile Devices
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-36742
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 5.09%
||
7 Day CHG~0.00%
Published-13 May, 2026 | 00:00
Updated-14 May, 2026 | 13:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hiseeu C90 v5.7.15 is vulnerable to Insecure Permissions. The UART bootloader is accessible when battery is disconnected (hidden/debug mode).

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-20718
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 1.71%
||
7 Day CHG~0.00%
Published-12 May, 2026 | 16:34
Updated-13 May, 2026 | 03:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions for some Intel(R) NPU Driver software installers before version 32.0.100.4511 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Action-Not Available
Vendor-n/a
Product-Intel(R) NPU Driver software installers
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-41712
Assigner-VMware by Broadcom
ShareView Details
Assigner-VMware by Broadcom
CVSS Score-7.5||HIGH
EPSS-0.04% / 13.52%
||
7 Day CHG~0.00%
Published-12 May, 2026 | 10:17
Updated-12 May, 2026 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ChatMemory DEFAULT_CONVERSATION_ID causes unintended cross-user data leakage

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-spring_aiSpring AI
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-44201
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.75%
||
7 Day CHG~0.00%
Published-11 May, 2026 | 14:42
Updated-12 May, 2026 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wagtail: Improper restriction handling on Documents and Images API

Wagtail is an open source content management system built on Django. Prior to 7.0.7, 7.3.2, and 7.4, the Documents and Images API incorrectly listed items in private collections. A user with access to the API could see the filename and name of documents and images in private collections. This vulnerability is fixed in 7.0.7, 7.3.2, and 7.4.

Action-Not Available
Vendor-torchboxwagtail
Product-wagtailwagtail
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-44200
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 7.85%
||
7 Day CHG~0.00%
Published-11 May, 2026 | 14:41
Updated-12 May, 2026 | 15:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wagtail: Improper permission handling when copying pages

Wagtail is an open source content management system built on Django. Prior to 7.0.7, 7.3.2, and 7.4, a CMS user with limited access to pages could copy a page they don't have access to to an area of the site they do. Once coped, they'd be able to view its contents, and potentially publish it. Permissions were correctly checked for the copy destination, but not for the source page. This vulnerability is fixed in 7.0.7, 7.3.2, and 7.4.

Action-Not Available
Vendor-torchboxwagtail
Product-wagtailwagtail
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-44199
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 9.07%
||
7 Day CHG~0.00%
Published-11 May, 2026 | 14:40
Updated-12 May, 2026 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wagtail: Improper permission handling when deleting form submissions

Wagtail is an open source content management system built on Django. Prior to 7.0.7, 7.3.2, and 7.4, a CMS user with limited access to form pages could delete submissions to form pages they don't have access to by crafting a form submission to delete submissions on a page they do have access to for submissions they don't. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. This vulnerability is fixed in 7.0.7, 7.3.2, and 7.4.

Action-Not Available
Vendor-torchboxwagtail
Product-wagtailwagtail
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-44198
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 8.62%
||
7 Day CHG~0.00%
Published-11 May, 2026 | 14:40
Updated-12 May, 2026 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wagtail: Improper permission handling when viewing page history

Wagtail is an open source content management system built on Django. Prior to 7.0.7, 7.3.2, and 7.4, a CMS user without the ability to edit a page could still access the history report for the page, potentially resulting in disclosure of sensitive information. This vulnerability is fixed in 7.0.7, 7.3.2, and 7.4.

Action-Not Available
Vendor-torchboxwagtail
Product-wagtailwagtail
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-44197
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 9.84%
||
7 Day CHG~0.00%
Published-11 May, 2026 | 14:39
Updated-14 May, 2026 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wagtail: Improper permission handling when comparing revisions

Wagtail is an open source content management system built on Django. Prior to 7.0.7, 7.3.2, and 7.4, a CMS user without the ability to edit a page could access revisions of the page through the revision compare view if they knew the primary key of two revisions. This could potentially result in disclosure of sensitive information. This vulnerability is fixed in 7.0.7, 7.3.2, and 7.4.

Action-Not Available
Vendor-torchboxwagtail
Product-wagtailwagtail
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2025-8325
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-6.3||MEDIUM
EPSS-0.04% / 11.36%
||
7 Day CHG~0.00%
Published-11 May, 2026 | 09:37
Updated-11 May, 2026 | 12:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control via Gateway API in Multiple WSO2 Products Allows Unauthorized Operations

The software fails to enforce role-based access controls for certain Gateway API invocations. Users with the 'Internal/Everyone' role can invoke these APIs, bypassing intended permission checks. This same vulnerability also affects Internal Service APIs, potentially exposing them in WSO2 APIM 3.x versions. A malicious actor with a valid user account on a vulnerable deployment can perform sensitive operations against the Gateway REST API regardless of their actual roles or privileges. This could lead to unintended behavior or misuse, particularly in production environments.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 Carbon API Manager Rest API UtilityWSO2 API ManagerWSO2 Traffic ManagerWSO2 Carbon API Management ImplementationWSO2 Universal GatewayWSO2 API Control Plane
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2026-7891
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-9.3||CRITICAL
EPSS-0.05% / 16.80%
||
7 Day CHG+0.01%
Published-07 May, 2026 | 21:07
Updated-08 May, 2026 | 13:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The VerySecureApp made by DIVD using Mendix Studio Pro 11.8.0 Beta allows unintended data exposure due to authorization misconfiguration. The VerySecureApp allows anonymous users of the MyFirstModule with the anonymous user role to gain access to all stored records, even though no access rights are explicitly configured on that role. Anonymous users are required to make a Mendix Entity available publicly. All versions of Mendix Studio Pro up to 11.8.0 Beta silently make an Anonymous user role follow user inheritance rules, without mentioning this explicitly in the documentation.

Action-Not Available
Vendor-DIVD
Product-VerySecureApp
CWE ID-CWE-277
Insecure Inherited Permissions
CVE-2026-6805
Assigner-Thales Group
ShareView Details
Assigner-Thales Group
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 12.63%
||
7 Day CHG~0.00%
Published-07 May, 2026 | 09:45
Updated-11 May, 2026 | 16:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vulnerability on Cryptobox external sharing feature

Vulnerability on the external sharing feature in Cryptobox allows an attacker knowing a sharing link URL to retrieve information from the server allowing an offline brute-force attack of the access code associated to this sharing link.

Action-Not Available
Vendor-thalesgroupErcom
Product-ercom_cryptoboxCryptobox
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-20448
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.89%
||
7 Day CHG~0.00%
Published-04 May, 2026 | 05:41
Updated-07 May, 2026 | 12:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In geniezone, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10708513; Issue ID: MSV-6281.

Action-Not Available
Vendor-MediaTek Inc.
Product-mt8796mt6897mt8781_firmwaremt6991_firmwaremt6989_firmwaremt8766mt6789mt6765_firmwaremt8768_firmwaremt8796_firmwaremt6768mt6768_firmwaremt8768mt8766_firmwaremt8775_firmwaremt8910_firmwaremt8893_firmwaremt8786_firmwaremt8786mt8793_firmwaremt6899mt8788e_firmwaremt8781mt8792_firmwaremt8893mt6765mt6789_firmwaremt6899_firmwaremt6991mt8775mt6897_firmwaremt8788emt8910mt6989mt6993_firmwaremt6877_firmwaremt8792mt6993mt8367_firmwaremt8791tmt8793mt6877mt8367mt8791t_firmwareMediaTek chipset
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-6265
Assigner-National Cyber Security Centre Finland (NCSC-FI)
ShareView Details
Assigner-National Cyber Security Centre Finland (NCSC-FI)
CVSS Score-7.3||HIGH
EPSS-0.03% / 7.71%
||
7 Day CHG~0.00%
Published-27 Apr, 2026 | 13:00
Updated-07 May, 2026 | 02:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation in Cerberus FTP Server =< 2025.4.2

Insecure preserved inherited permissions vulnerability in Cerberus FTP Server on Windows allows Privilege Escalation.This issue has been resolved in Cerberus FTP Server: 2026.1

Action-Not Available
Vendor-cerberusftpCerberus
Product-ftp_serverCerberus FTP Server
CWE ID-CWE-278
Insecure Preserved Inherited Permissions
CVE-2026-35361
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-3.4||LOW
EPSS-0.01% / 3.39%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 16:08
Updated-27 Apr, 2026 | 12:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
uutils coreutils mknod Security Label Inconsistency and Broken Cleanup on SELinux Systems

The mknod utility in uutils coreutils fails to handle security labels atomically by creating device nodes before setting the SELinux context. If labeling fails, the utility attempts cleanup using std::fs::remove_dir, which cannot remove device nodes or FIFOs. This leaves mislabeled nodes behind with incorrect default contexts, potentially allowing unauthorized access to device nodes that should have been restricted by mandatory access controls.

Action-Not Available
Vendor-uutilsUutils
Product-coreutilscoreutils
CWE ID-CWE-281
Improper Preservation of Permissions
CWE ID-CWE-459
Incomplete Cleanup
CVE-2026-35351
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-4.2||MEDIUM
EPSS-0.01% / 1.82%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 16:08
Updated-27 Apr, 2026 | 12:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
uutils coreutils mv Silent Ownership Loss in Cross-Device Operations

The mv utility in uutils coreutils fails to preserve file ownership during moves across different filesystem boundaries. The utility falls back to a copy-and-delete routine that creates the destination file using the caller's UID/GID rather than the source's metadata. This flaw breaks backups and migrations, causing files moved by a privileged user (e.g., root) to become root-owned unexpectedly, which can lead to information disclosure or restricted access for the intended owners.

Action-Not Available
Vendor-uutilsUutils
Product-coreutilscoreutils
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2026-35350
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-6.6||MEDIUM
EPSS-0.01% / 1.72%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 16:08
Updated-24 Apr, 2026 | 19:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
uutils coreutils cp Unexpected Privileged Executable Creation with -p

The cp utility in uutils coreutils fails to properly handle setuid and setgid bits when ownership preservation fails. When copying with the -p (preserve) flag, the utility applies the source mode bits even if the chown operation is unsuccessful. This can result in a user-owned copy retaining original privileged bits, creating unexpected privileged executables that violate local security policies. This differs from GNU cp, which clears these bits when ownership cannot be preserved.

Action-Not Available
Vendor-uutilsUutils
Product-coreutilscoreutils
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2026-0539
Assigner-Switzerland National Cyber Security Centre (NCSC)
ShareView Details
Assigner-Switzerland National Cyber Security Centre (NCSC)
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.71%
||
7 Day CHG~0.00%
Published-22 Apr, 2026 | 13:02
Updated-19 May, 2026 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation in pcvisit service client

Incorrect Default Permissions in pcvisit service binary on Windows allows a low-privileged local attacker to escalate their privileges by overwriting the service binary with arbitrary contents. This service binary is automatically launched with NT\SYSTEM privileges on boot. This issue affects all versions after 22.6.22.1329 and was fixed in 25.12.3.1745.

Action-Not Available
Vendor-pcvisit
Product-pcvisit Remote Host Modul
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-6823
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.3||HIGH
EPSS-0.16% / 36.04%
||
7 Day CHG-0.00%
Published-21 Apr, 2026 | 20:36
Updated-22 Apr, 2026 | 21:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HKUDS OpenHarness Insecure Default Remote Channel Allowlist

HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the configured channel can bypass access controls and reach host-backed agent runtimes, potentially leading to unauthorized file disclosure and read access through default-enabled read-only tools.

Action-Not Available
Vendor-HKUDS
Product-OpenHarness
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-6819
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.03% / 10.38%
||
7 Day CHG~0.00%
Published-21 Apr, 2026 | 19:41
Updated-22 Apr, 2026 | 21:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HKUDS OpenHarness Plugin Management Command Exposure

HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands including /plugin install, /plugin enable, /plugin disable, and /reload-plugins to remote senders by default. Attackers who gain access through the channel layer can remotely manage plugin trust and activation state, enabling unauthorized plugin installation and activation on the system.

Action-Not Available
Vendor-HKUDS
Product-OpenHarness
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-39454
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.5||HIGH
EPSS-0.01% / 2.97%
||
7 Day CHG~0.00%
Published-20 Apr, 2026 | 08:04
Updated-12 May, 2026 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SKYSEA Client View and SKYMEC IT Manager provided by Sky Co.,LTD. configure the installation folder with improper file access permission settings. A non-administrative user may manipulate and/or place arbitrary files within the installation folder of the product. As a result, arbitrary code may be executed with the administrative privilege.

Action-Not Available
Vendor-skygroupSky Co.,LTD.
Product-skysea_client_viewskymec_it_managerSKYMEC IT ManagerSKYSEA Client View
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2026-30266
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.52%
||
7 Day CHG~0.00%
Published-20 Apr, 2026 | 00:00
Updated-27 Apr, 2026 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure Permissions vulnerability in DeepCool DeepCreative v.1.2.12 and before allows a local attacker to execute arbitrary code via a crafted file

Action-Not Available
Vendor-deepcooln/a
Product-deepcreativen/a
CWE ID-CWE-277
Insecure Inherited Permissions
CVE-2026-27910
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.29%
||
7 Day CHG+0.01%
Published-14 Apr, 2026 | 16:58
Updated-12 May, 2026 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Installer Elevation of Privilege Vulnerability

Improper handling of insufficient permissions or privileges in Windows Installer allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_10_21h2windows_10_1809windows_11_25h2windows_server_2022windows_server_2025windows_10_1607windows_server_2019windows_11_26h1windows_11_24h2windows_server_2022_23h2windows_server_2016windows_11_23h2windows_server_2012Windows Server 2019Windows 11 version 26H1Windows 10 Version 1809Windows Server 2012 R2 (Server Core installation)Windows 11 version 22H3Windows Server 2012Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 22H2Windows 10 Version 21H2Windows Server 2016Windows 11 Version 24H2Windows Server 2012 R2Windows Server 2019 (Server Core installation)Windows Server 2025Windows Server 2022Windows Server 2012 (Server Core installation)Windows 11 Version 23H2Windows Server 2016 (Server Core installation)Windows 10 Version 1607
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-30811
Assigner-Pandora FMS
ShareView Details
Assigner-Pandora FMS
CVSS Score-8.4||HIGH
EPSS-0.04% / 11.49%
||
7 Day CHG~0.00%
Published-13 Apr, 2026 | 15:47
Updated-22 Apr, 2026 | 14:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization in Configuration Ajax Endpoint leads to Information Disclosure

Missing Authorization vulnerability allows Exposure of Sensitive Information via configuration endpoint. This issue affects Pandora FMS: from 777 through 800

Action-Not Available
Vendor-Pandora FMS S.L.U.
Product-pandora_fmsPandora FMS
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-21013
Assigner-Samsung Mobile
ShareView Details
Assigner-Samsung Mobile
CVSS Score-6.9||MEDIUM
EPSS-0.02% / 3.89%
||
7 Day CHG~0.00%
Published-13 Apr, 2026 | 05:04
Updated-16 Apr, 2026 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permission in Galaxy Wearable prior to version 2.2.68.26 allows local attackers to access sensitive information.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-galaxy_wearableGalaxy Wearable
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-25203
Assigner-Samsung TV & Appliance
ShareView Details
Assigner-Samsung TV & Appliance
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.82%
||
7 Day CHG~0.00%
Published-10 Apr, 2026 | 01:24
Updated-14 Apr, 2026 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Samsung MagicINFO 9 Server Incorrect Default Permissions Local Privilege Escalation Vulnerability This issue affects MagicINFO 9 Server: less than 21.1091.1.

Action-Not Available
Vendor-Samsung Electronics
Product-MagicINFO 9 Server
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-58713
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.00% / 0.18%
||
7 Day CHG~0.00%
Published-08 Apr, 2026 | 13:55
Updated-04 May, 2026 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rhpam: privilege escalation via excessive /etc/passwd permissions

A container privilege escalation flaw was found in certain Red Hat Process Automation Manager images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

Action-Not Available
Vendor-Red Hat, Inc.
Product-process_automation_managerRed Hat Process Automation 7
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-57853
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.00% / 0.15%
||
7 Day CHG~0.00%
Published-08 Apr, 2026 | 13:55
Updated-01 May, 2026 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Web-terminal: privilege escalation via excessive /etc/passwd permissions

A container privilege escalation flaw was found in certain Web Terminal images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

Action-Not Available
Vendor-Red Hat, Inc.
Product-web_terminalRed Hat Web Terminal
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-57854
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.00% / 0.18%
||
7 Day CHG~0.00%
Published-08 Apr, 2026 | 13:55
Updated-04 May, 2026 | 13:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Osus-operator: privilege escalation via excessive /etc/passwd permissions

A container privilege escalation flaw was found in certain OpenShift Update Service (OSUS) images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

Action-Not Available
Vendor-Red Hat, Inc.
Product-openshift_update_serviceRed Hat OpenShift Update Service
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-57851
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 1.05%
||
7 Day CHG~0.00%
Published-08 Apr, 2026 | 13:55
Updated-01 May, 2026 | 20:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mce: privilege escalation via excessive /etc/passwd permissions

A container privilege escalation flaw was found in certain Multicluster Engine for Kubernetes images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

Action-Not Available
Vendor-Red Hat, Inc.
Product-advanced_cluster_management_for_kubernetesMulticluster Engine for Kubernetes
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-57847
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.00% / 0.16%
||
7 Day CHG~0.00%
Published-08 Apr, 2026 | 13:55
Updated-01 May, 2026 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ansible-automation-platform: privilege escalation via excessive group writable /etc/passwd permissions

A container privilege escalation flaw was found in certain Ansible Automation Platform images. This issue arises from the /etc/passwd file being created with group-writable permissions during the build process. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This vulnerability allows an attacker to add a new user with any arbitrary UID, including UID 0, gaining full root privileges within the container.

Action-Not Available
Vendor-Red Hat, Inc.
Product-ansible_automation_platformRed Hat Ansible Automation Platform 2
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-7024
Assigner-Airbus
ShareView Details
Assigner-Airbus
CVSS Score-5.6||MEDIUM
EPSS-0.01% / 1.84%
||
7 Day CHG~0.00%
Published-03 Apr, 2026 | 07:30
Updated-03 Apr, 2026 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local privilege escalation in Windows Server OS through installed Tetra Connectivity Server (TCS)

Incorrect Default Permissions vulnerability in AIRBUS PSS TETRA Connectivity Server on Windows Server OS allows Privilege Abuse. An attacker may execute arbitrary code with SYSTEM privileges if a user is tricked or directed to place a crafted file into the vulnerable directory. This issue affects TETRA connectivity Server: 7.0. Vulnerability fix is available and delivered to impacted customers.

Action-Not Available
Vendor-AIRBUS
Product-TETRA Connectivity Server (TCS)
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-35385
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.36%
||
7 Day CHG+0.02%
Published-02 Apr, 2026 | 16:30
Updated-27 Apr, 2026 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

Action-Not Available
Vendor-OpenBSD
Product-opensshOpenSSH
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2026-21765
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-8.8||HIGH
EPSS-0.01% / 1.95%
||
7 Day CHG~0.00%
Published-01 Apr, 2026 | 23:36
Updated-16 Apr, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL BigFix Platform is affected by insecure permissions on private cryptographic keys

HCL BigFix Platform is affected by insecure permissions on private cryptographic keys.  The private cryptographic keys located on a Windows host machine might be subject to overly permissive file system permissions.

Action-Not Available
Vendor-HCLSoftwareHCL Technologies Ltd.
Product-bigfix_platformBigFix Platform
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2026-24096
Assigner-Checkmk GmbH
ShareView Details
Assigner-Checkmk GmbH
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 16.56%
||
7 Day CHG~0.00%
Published-01 Apr, 2026 | 10:07
Updated-07 Apr, 2026 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient permission validation on multiple REST API Quick Setup endpoints

Insufficient permission validation on multiple REST API Quick Setup endpoints in Checkmk 2.5.0 (beta) before version 2.5.0b2 and 2.4.0 before version 2.4.0p25 allows low-privileged users to perform unauthorized actions or obtain sensitive information

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2026-34450
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 0.94%
||
7 Day CHG~0.00%
Published-31 Mar, 2026 | 21:32
Updated-13 Apr, 2026 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Claude SDK for Python: Insecure Default File Permissions in Local Filesystem Memory Tool

The Claude SDK for Python provides access to the Claude API from Python applications. From version 0.86.0 to before version 0.87.0, the local filesystem memory tool in the Anthropic Python SDK created memory files with mode 0o666, leaving them world-readable on systems with a standard umask and world-writable in environments with a permissive umask such as many Docker base images. A local attacker on a shared host could read persisted agent state, and in containerized deployments could modify memory files to influence subsequent model behavior. Both the synchronous and asynchronous memory tool implementations were affected. This issue has been patched in version 0.87.0.

Action-Not Available
Vendor-anthropicanthropics
Product-claude_sdk_for_pythonanthropic-sdk-python
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2026-2123
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Assigner-OpenText (formerly Micro Focus)
CVSS Score-8.6||HIGH
EPSS-0.01% / 3.43%
||
7 Day CHG~0.00%
Published-31 Mar, 2026 | 17:18
Updated-03 Apr, 2026 | 18:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation vulnerability in Operations Agent

A security audit identified a privilege escalation vulnerability in Operations Agent(<=OA 12.29) on Windows. Under specific conditions Operations Agent may run executables from specific writeable locations.Thanks to Manuel Rickli & Philippe Leiser of Oneconsult AG for reporting this vulnerability

Action-Not Available
Vendor-Micro Focus International LimitedMicrosoft CorporationOpen Text Corporation
Product-operations_agentwindowsOperations Agent
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2025-15615
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-6.9||MEDIUM
EPSS-0.07% / 21.67%
||
7 Day CHG~0.00%
Published-27 Mar, 2026 | 16:23
Updated-14 May, 2026 | 02:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wazuh Manager authd service Improper SSL/TLS Renegotiation Handling leading to Denial of Service

Wazuh Manager authd service in wazuh-manager packages through version 4.7.3 contains an improper restriction of client-initiated SSL/TLS renegotiation vulnerability that allows remote attackers to cause a denial of service by sending excessive renegotiation requests. Attackers can exploit the lack of renegotiation limits to consume CPU resources and render the authd service unavailable.

Action-Not Available
Vendor-Wazuh, Inc.
Product-wazuhwazuh-manager
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-32983
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-6.9||MEDIUM
EPSS-0.15% / 35.80%
||
7 Day CHG~0.00%
Published-27 Mar, 2026 | 15:44
Updated-12 May, 2026 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SSL/TLS Renegotiation DoS in Wazuh Manager authd service

Wazuh Manager authd service in wazuh-manager packages through version 4.7.3 contains an improper restriction of client-initiated SSL/TLS renegotiation vulnerability that allows remote attackers to cause a denial of service by sending excessive renegotiation requests. Attackers can exploit the lack of renegotiation limits to consume CPU resources and render the authd service unavailable.

Action-Not Available
Vendor-Wazuh, Inc.
Product-wazuhwazuh-manager
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2026-4948
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 6.13%
||
7 Day CHG~0.00%
Published-27 Mar, 2026 | 05:30
Updated-15 May, 2026 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Firewalld: firewalld: local unprivileged user can modify firewall state due to d-bus setter mis-authorization

A flaw was found in firewalld. A local unprivileged user can exploit this vulnerability by mis-authorizing two runtime D-Bus (Desktop Bus) setters, setZoneSettings2 and setPolicySettings. This mis-authorization allows the user to modify the runtime firewall state without proper authentication, leading to unauthorized changes in network security configurations.

Action-Not Available
Vendor-firewalldRed Hat, Inc.
Product-firewalldenterprise_linuxRed Hat Enterprise Linux 10Red Hat OpenShift Container Platform 4Red Hat Enterprise Linux 8Red Hat Enterprise Linux 7Red Hat Enterprise Linux 9
CWE ID-CWE-279
Incorrect Execution-Assigned Permissions
CVE-2026-0748
Assigner-Drupal.org
ShareView Details
Assigner-Drupal.org
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 8.81%
||
7 Day CHG~0.00%
Published-26 Mar, 2026 | 21:17
Updated-01 Apr, 2026 | 16:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Access bypass in Drupal 7 i18n_node translation UI

In the Drupal 7 Internationalization (i18n) module, the i18n_node submodule allows a user with both "Translate content" and "Administer content translations" permissions to view and attach unpublished nodes via the translation UI and its autocomplete widget. This bypasses intended access controls and discloses unpublished node titles and IDs. Exploit affects versions 7.x-1.0 up to and including 7.x-1.35.

Action-Not Available
Vendor-internationalization_projectThe Drupal Association
Product-internationalizationInternationalization (i18n) - i18n_node submodule
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-284
Improper Access Control
CVE-2026-3190
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 9.88%
||
7 Day CHG~0.00%
Published-26 Mar, 2026 | 19:12
Updated-02 Apr, 2026 | 16:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: keycloak: information disclosure via improper role enforcement in uma 2.0 protection api

A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user with a token issued for a resource server client, even without the `uma_protection` role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure.

Action-Not Available
Vendor-Red Hat, Inc.
Product-build_of_keycloakRed Hat build of Keycloak 26.4Red Hat build of Keycloak 26.4.11
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 41
  • 42
  • Next