Filtered by NVD-CWE-Other
Total 29701 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-32335 1 Ibm 2 Maximo Application Suite, Maximo Asset Management 2025-01-14 3.7 Low
IBM Maximo Application Suite 8.10, 8.11 and IBM Maximo Asset Management 7.6.1.3 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 255075.
CVE-2019-9513 12 Apache, Apple, Canonical and 9 more 25 Traffic Server, Mac Os X, Swiftnio and 22 more 2025-01-14 7.5 High
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
CVE-2023-33192 1 Tweedegolf 1 Ntpd-rs 2025-01-14 7.5 High
ntpd-rs is an NTP implementation written in Rust. ntpd-rs does not validate the length of NTS cookies in received NTP packets to the server. An attacker can crash the server by sending a specially crafted NTP packet containing a cookie shorter than what the server expects. The server also crashes when it is not configured to handle NTS packets. The issue was caused by improper slice indexing. The indexing operations were replaced by safer alternatives that do not crash the ntpd-rs server process but instead properly handle the error condition. A patch was released in version 0.3.3.
CVE-2023-23561 1 Stormshield 1 Endpoint Security 2025-01-14 5.5 Medium
Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control: authenticated users can read sensitive information.
CVE-2023-2901 1 Nfine Rapid Development Platform Project 1 Nfine Rapid Development Platform 2025-01-14 4.3 Medium
A vulnerability was found in NFine Rapid Development Platform 20230511. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /SystemManage/User/GetGridJson?_search=false&nd=1680855479750&rows=50&page=1&sidx=F_CreatorTime+desc&sord=asc. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229975. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-56448 1 Huawei 2 Emui, Harmonyos 2025-01-13 6.7 Medium
Vulnerability of improper access control in the home screen widget module Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2022-39075 1 Zte 34 Axon 40 Ultra, Axon 40 Ultra Firmware, Blade A31 and 31 more 2025-01-13 7.1 High
There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could delete some system files without user permission.
CVE-2022-39074 1 Zte 34 Axon 40 Ultra, Axon 40 Ultra Firmware, Blade A31 and 31 more 2025-01-13 3.3 Low
There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could start a non-public interface of an application without user permission.
CVE-2022-39071 1 Zte 34 Axon 40 Ultra, Axon 40 Ultra Firmware, Blade A31 and 31 more 2025-01-13 7.1 High
There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could overwrite some system configuration files and user installers without user permission.
CVE-2023-33741 2 Google, Macro-video 2 Android, V380 Pro 2025-01-13 7.5 High
Macrovideo v380pro v1.4.97 shares the device id and password when sharing the device.
CVE-2023-33740 2 Google, Luowice 2 Android, Luowice 2025-01-13 7.5 High
Incorrect access control in luowice v3.5.18 allows attackers to access cloud source code information via modification fo the Verify parameter in a warning message.
CVE-2022-4709 1 Royal-elementor-addons 1 Royal Elementor Addons 2025-01-13 4.3 Medium
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_import_library_template' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to import and activate templates from the plugin's template library.
CVE-2022-4700 1 Royal-elementor-addons 1 Royal Elementor Addons 2025-01-13 5.4 Medium
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_activate_required_theme' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to activate the 'royal-elementor-kit' theme. If no such theme is installed doing so can also impact site availability as the site attempts to load a nonexistent theme.
CVE-2022-4702 1 Royal-elementor-addons 1 Royal Elementor Addons 2025-01-13 5.4 Medium
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_fix_royal_compatibility' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to deactivate every plugin on the site unless it is part of an extremely limited hardcoded selection. This also switches the site to the 'royal-elementor-kit' theme, potentially resulting in availability issues.
CVE-2022-4711 1 Royal-elementor-addons 1 Royal Elementor Addons 2025-01-13 4.3 Medium
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_save_mega_menu_settings' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to enable and modify Mega Menu settings for any menu item.
CVE-2022-4708 1 Royal-elementor-addons 1 Royal Elementor Addons 2025-01-13 4.3 Medium
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_save_template_conditions' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to modify the conditions under which templates are displayed.
CVE-2022-4704 1 Royal-elementor-addons 1 Royal Elementor Addons 2025-01-13 5.4 Medium
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_import_templates_kit' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to import preset site configuration templates including images and settings.
CVE-2022-4705 1 Royal-elementor-addons 1 Royal Elementor Addons 2025-01-13 4.3 Medium
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_final_settings_setup' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to finalize activation of preset site configuration templates, which can be chosen and imported via a separate action documented in CVE-2022-4704.
CVE-2022-4703 1 Royal-elementor-addons 1 Royal Elementor Addons 2025-01-13 4.3 Medium
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_reset_previous_import' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to reset previously imported data.
CVE-2022-4701 1 Royal-elementor-addons 1 Royal Elementor Addons 2025-01-13 4.3 Medium
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_activate_required_plugins' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to activate the 'contact-form-7', 'media-library-assistant', or 'woocommerce' plugins if they are installed on the site.