Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-267:Privilege Defined With Unsafe Actions
Weakness ID:267
Version:v4.17
Weakness Name:Privilege Defined With Unsafe Actions
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
59Vulnerabilities found

CVE-2022-38124
Assigner-Secomea A/S
ShareView Details
Assigner-Secomea A/S
CVSS Score-5.7||MEDIUM
EPSS-0.31% / 53.77%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 13:06
Updated-18 Apr, 2025 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unwanted debug tool

Debug tool in Secomea SiteManager allows logged-in administrator to modify system state in an unintended manner.

Action-Not Available
Vendor-Secomea A/S
Product-sitemanager_1139_firmwaresitemanager_1129sitemanager_3539sitemanager_1139sitemanager_3529sitemanager_1149sitemanager_3329sitemanager_3329_firmwaresitemanager_3549_firmwaresitemanager_1539sitemanager_1529sitemanager_1549_firmwaresitemanager_3529_firmwaresitemanager_3539_firmwaresitemanager_3349sitemanager_3349_firmwaresitemanager_1539_firmwaresitemanager_1129_firmwaresitemanager_1149_firmwaresitemanager_1549sitemanager_3339sitemanager_3549sitemanager_3339_firmwaresitemanager_1529_firmwareSiteManager
CWE ID-CWE-267
Privilege Defined With Unsafe Actions
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-40354
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-7.1||HIGH
EPSS-0.21% / 43.08%
||
7 Day CHG~0.00%
Published-14 Sep, 2021 | 10:47
Updated-04 Aug, 2024 | 02:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.8), Teamcenter V13.0 (All versions < V13.0.0.7), Teamcenter V13.1 (All versions < V13.1.0.5), Teamcenter V13.2 (All versions < 13.2.0.2). The "surrogate" functionality on the user profile of the application does not perform sufficient access control that could lead to an account takeover. Any profile on the application can perform this attack and access any other user assigned tasks via the "inbox/surrogate tasks".

Action-Not Available
Vendor-Siemens AG
Product-teamcenter_visualizationTeamcenter V12.4Teamcenter V13.0Teamcenter V13.2Teamcenter V13.1
CWE ID-CWE-267
Privilege Defined With Unsafe Actions
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-32739
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.30% / 52.66%
||
7 Day CHG~0.00%
Published-15 Jul, 2021 | 14:55
Updated-03 Nov, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Results of queries for ApiListener objects include the ticket salt which allows in turn to steal (more privileged) identities

Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user's credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node's certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user's identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects.

Action-Not Available
Vendor-icingaIcingaDebian GNU/Linux
Product-debian_linuxicingaicinga2
CWE ID-CWE-267
Privilege Defined With Unsafe Actions
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-29396
Assigner-Odoo
ShareView Details
Assigner-Odoo
CVSS Score-9.9||CRITICAL
EPSS-1.81% / 82.57%
||
7 Day CHG~0.00%
Published-22 Dec, 2020 | 16:25
Updated-04 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A sandboxing issue in Odoo Community 11.0 through 13.0 and Odoo Enterprise 11.0 through 13.0, when running with Python 3.6 or later, allows remote authenticated users to execute arbitrary code, leading to privilege escalation.

Action-Not Available
Vendor-odooOdooPython Software Foundation
Product-pythonodooOdoo CommunityOdoo Enterprise
CWE ID-CWE-267
Privilege Defined With Unsafe Actions
CVE-2020-7824
Assigner-KrCERT/CC
ShareView Details
Assigner-KrCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.17% / 38.70%
||
7 Day CHG~0.00%
Published-25 Aug, 2020 | 18:41
Updated-17 Sep, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ericssonlg iPECS Privilege Escalation Vulnerability

A vulnerability in the web-based management interface of iPECS could allow an authenticated, remote attacker to get administrator permission. The vulnerability is due to insecure permission when handling session cookies. An attacker could exploit this vulnerability by modification the cookie value to an affected device. A successful exploit could allow the attacker access to sensitive device information, which includes configuration files.

Action-Not Available
Vendor-ericssonlgEricsson-LG
Product-ipecsiPCES UCM
CWE ID-CWE-267
Privilege Defined With Unsafe Actions
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2019-10170
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.74% / 72.66%
||
7 Day CHG~0.00%
Published-08 May, 2020 | 13:47
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Keycloak admin console, where the realm management interface permits a script to be set via the policy. This flaw allows an attacker with authenticated user and realm management permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the application user.

Action-Not Available
Vendor-[UNKNOWN]Red Hat, Inc.
Product-keycloakkeycloak
CWE ID-CWE-267
Privilege Defined With Unsafe Actions
CVE-2019-10169
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.61% / 69.31%
||
7 Day CHG~0.00%
Published-08 May, 2020 | 13:47
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Keycloak’s user-managed access interface, where it would permit a script to be set in the UMA policy. This flaw allows an authenticated attacker with UMA permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the user running application.

Action-Not Available
Vendor-[UNKNOWN]Red Hat, Inc.
Product-keycloakkeycloak
CWE ID-CWE-267
Privilege Defined With Unsafe Actions
CVE-2019-14865
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.04% / 11.20%
||
7 Day CHG-0.02%
Published-29 Nov, 2019 | 09:50
Updated-29 Apr, 2025 | 20:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots.

Action-Not Available
Vendor-[UNKNOWN]GNURed Hat, Inc.
Product-grub2enterprise_linuxenterprise_linux_eusenterprise_linux_server_ausenterprise_linux_server_tusgrub2
CWE ID-CWE-267
Privilege Defined With Unsafe Actions
CVE-2017-2616
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.19%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 19:00
Updated-09 Jun, 2025 | 15:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.

Action-Not Available
Vendor-util-linux_projectLinux Kernel Organization, IncDebian GNU/LinuxRed Hat, Inc.
Product-enterprise_linux_serverdebian_linuxenterprise_linux_server_eusenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_desktoputil-linuxutil-linux
CWE ID-CWE-267
Privilege Defined With Unsafe Actions
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
  • Previous
  • 1
  • 2
  • Next