Filtered by CWE-269
Total 2097 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-44019 1 Trendmicro 1 Worry-free Business Security 2024-11-21 7.8 High
An unnecessary privilege vulnerability in Trend Micro Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-44020 and 44021.
CVE-2021-43860 4 Debian, Fedoraproject, Flatpak and 1 more 4 Debian Linux, Fedora, Flatpak and 1 more 2024-11-21 8.2 High
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there's a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the "xa.metadata" key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the *actual* metadata, from the "metadata" file to ensure it wasn't lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from *before* the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata.
CVE-2021-43858 2 Minio, Redhat 2 Minio, Acm 2024-11-21 8.8 High
MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
CVE-2021-43835 1 Sulu 1 Sulu 2024-11-21 7.2 High
Sulu is an open-source PHP content management system based on the Symfony framework. In affected versions Sulu users who have access to any subset of the admin UI are able to elevate their privilege. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction. The versions have been patched in 2.2.18, 2.3.8 and 2.4.0. For users unable to upgrade the only known workaround is to apply a patch to the ProfileController manually.
CVE-2021-43828 1 Patrowl 1 Patrowlmanager 2024-11-21 7.5 High
PatrOwl is a free and open-source solution for orchestrating Security Operations. In versions prior to 1.77 an improper privilege management (IDOR) has been found in PatrowlManager. All imports findings file is placed under /media/imports/<owner_id>/<tmp_file> In that, owner_id is predictable and tmp_file is in format of import_<ownder_id>_<time_created>, for example: import_1_1639213059582.json This filename is predictable and allows anyone without logging in to download all finding import files This vulnerability is capable of allowing unlogged in users to download all finding imports file. Users are advised to update to 1.7.7 as soon as possible. There are no known workarounds.
CVE-2021-43793 1 Discourse 1 Discourse 2024-11-21 4.3 Medium
Discourse is an open source discussion platform. In affected versions a vulnerability in the Polls feature allowed users to vote multiple times in a single-option poll. The problem is patched in the latest tests-passed, beta and stable versions of Discourse
CVE-2021-43528 3 Debian, Mozilla, Redhat 5 Debian Linux, Thunderbird, Enterprise Linux and 2 more 2024-11-21 6.5 Medium
Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird < 91.4.0.
CVE-2021-43211 1 Microsoft 1 Windows 10 Update Assistant 2024-11-21 5.5 Medium
Windows 10 Update Assistant Elevation of Privilege Vulnerability
CVE-2021-43076 1 Fortinet 1 Fortiadc 2024-11-21 6.3 Medium
An improper privilege management vulnerability [CWE-269] in FortiADC versions 6.2.1 and below, 6.1.5 and below, 6.0.4 and below, 5.4.5 and below and 5.3.7 and below may allow a remote authenticated attacker with restricted user profile to modify the system files using the shell access.
CVE-2021-42956 2 Microsoft, Zoho 2 Windows, Manageengine Remote Access Plus Server 2024-11-21 7.8 High
Zoho Remote Access Plus Server Windows Desktop Binary fixed in 10.1.2132.6 is affected by a sensitive information disclosure vulnerability. Due to improper privilege management, the process launches as the logged in user, so memory dump can be done by non-admin also. Remotely, an attacker can dump all sensitive information including DB Connection string, entire IT infrastructure details, commands executed by IT admin including credentials, secrets, private keys and more.
CVE-2021-42562 1 Mitre 1 Caldera 2024-11-21 8.1 High
An issue was discovered in CALDERA 2.8.1. It does not properly segregate user privileges, resulting in non-admin users having access to read and modify configuration or other components that should only be accessible by admin users.
CVE-2021-42322 1 Microsoft 1 Visual Studio Code 2024-11-21 7.8 High
Visual Studio Code Elevation of Privilege Vulnerability
CVE-2021-42319 1 Microsoft 2 Visual Studio 2017, Visual Studio 2019 2024-11-21 4.7 Medium
Visual Studio Elevation of Privilege Vulnerability
CVE-2021-42304 1 Microsoft 1 Azure Real Time Operating System 2024-11-21 6.6 Medium
Azure RTOS Elevation of Privilege Vulnerability
CVE-2021-42303 1 Microsoft 1 Azure Real Time Operating System 2024-11-21 6.6 Medium
Azure RTOS Elevation of Privilege Vulnerability
CVE-2021-42302 1 Microsoft 1 Azure Real Time Operating System 2024-11-21 6.6 Medium
Azure RTOS Elevation of Privilege Vulnerability
CVE-2021-42291 1 Microsoft 11 Windows Server, Windows Server 2004, Windows Server 2008 and 8 more 2024-11-21 7.5 High
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2021-42286 1 Microsoft 8 Windows 10, Windows 10 1809, Windows 10 20h2 and 5 more 2024-11-21 7.8 High
Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability
CVE-2021-42285 1 Microsoft 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more 2024-11-21 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2021-42283 1 Microsoft 23 Windows 10, Windows 10 1507, Windows 10 1607 and 20 more 2024-11-21 8.8 High
NTFS Elevation of Privilege Vulnerability