Search Results (1519 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-27677 1 Printerlogic 2 Vasion Print, Virtual Appliance 2025-11-03 9.8 Critical
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Symbolic Links For Unprivileged File Interaction V-2022-002.
CVE-2022-22948 1 Vmware 2 Cloud Foundation, Vcenter Server 2025-10-31 6.5 Medium
The vCenter Server contains an information disclosure vulnerability due to improper permission of files. A malicious actor with non-administrative access to the vCenter Server may exploit this issue to gain access to sensitive information.
CVE-2024-42188 1 Hcltech 1 Connections 2025-10-28 3.7 Low
HCL Connections is vulnerable to a broken access control vulnerability that may allow an unauthorized user to update data in certain scenarios.
CVE-2025-35062 1 Newforma 2 Project Center, Project Center Server 2025-10-22 5.3 Medium
Newforma Info Exchange (NIX) before version 2023.1 by default allows anonymous authentication which allows an unauthenticated attacker to exploit additional vulnerabilities that require authentication.
CVE-2025-36632 2 Microsoft, Tenable 2 Windows, Nessus Agent 2025-10-21 7.8 High
In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could execute code with SYSTEM privilege.
CVE-2025-54086 1 Absolute 1 Secure Access 2025-10-16 3.3 Low
CVE-2025-54086 is an excess permissions vulnerability in the Warehouse component of Absolute Secure Access prior to version 14.10. Attackers with access to the local file system can read the Java keystore file. The attack complexity is low, there are no attack requirements, the privileges required are low and no user interaction is required. Impact to confidentiality is low, there is no impact to integrity or availability.
CVE-2025-46014 1 Honor 1 Pc Manager 2025-10-15 8.8 High
Several services in Honor Device Co., Ltd Honor PC Manager v16.0.0.118 was discovered to connect services to the named pipe iMateBookAssistant with default or overly permissive security attributes, leading to a privilege escalation.
CVE-2025-29504 1 Huang-yk 1 Student-manage 2025-10-15 7.8 High
Insecure Permission vulnerability in student-manage 1 allows a local attacker to escalate privileges via the Unsafe permission verification.
CVE-2025-0797 1 Escanav 1 Escan Anti-virus 2025-10-09 3.3 Low
A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects unknown code of the file /var/Microworld/ of the component Quarantine Handler. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-13188 1 Escanav 1 Escan Anti-virus 2025-10-09 5.3 Medium
A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been rated as critical. Affected by this issue is some unknown functionality of the file /opt/MicroWorld/var/ of the component Installation Handler. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-52551 3 Jenkins, Jenkins Project, Redhat 3 Pipeline\, Jenkins Pipeline Declaratrive Plugin, Ocp Tools 2025-10-08 8 High
Jenkins Pipeline: Declarative Plugin 2.2214.vb_b_34b_2ea_9b_83 and earlier does not check whether the main (Jenkinsfile) script used to restart a build from a specific stage is approved, allowing attackers with Item/Build permission to restart a previous build whose (Jenkinsfile) script is no longer approved.
CVE-2024-54745 1 Wavlink 2 Wn701ae, Wn701ae Firmware 2025-10-03 9.8 Critical
WAVLINK WN701AE M01AE_V240305 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root.
CVE-2024-54747 1 Wavlink 2 Wn531p3, Wn531p3 Firmware 2025-10-03 9.8 Critical
WAVLINK WN531P3 202383 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root.
CVE-2024-55398 1 4cstrategies 1 Exonaut 2025-10-01 6.5 Medium
4C Strategies Exonaut before v22.4 was discovered to contain insecure permissions.
CVE-2024-46465 2 Microsoft, Primx 2 Windows, Cryhod 2025-10-01 7.8 High
By default, dedicated folders of CRYHOD for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of CRYHOD has to be modified to prevent this vulnerability.
CVE-2024-48533 2 Esoft, Esoftplanner 2 Planner, Esoft Planner 2025-10-01 5.3 Medium
A discrepancy between responses for valid and invalid e-mail accounts in the Forgot your Login? module of eSoft Planner 3.24.08271-USA allows attackers to enumerate valid user e-mail accounts.
CVE-2024-40514 1 Themesbrand 1 Chatvia 2025-09-30 4.6 Medium
Insecure Permissions vulnerability in themesebrand Chatvia v.5.3.2 allows a remote attacker to escalate privileges via the User profile name and image upload functions.
CVE-2025-55111 2 Bmc, Linux 3 Control-m/agent, Control-m\/agent, Linux Kernel 2025-09-29 5.5 Medium
Certain files with overly permissive permissions were identified in the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions as well as in newer versions which were upgraded from an affected version. These files contain keys and passwords relating to SSL files, keystore and policies. An attacker with local access to the system running the Agent can access these files.
CVE-2024-58046 1 Huawei 1 Harmonyos 2025-09-26 6.2 Medium
Permission management vulnerability in the lock screen module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-46586 1 Huawei 1 Harmonyos 2025-09-26 5.1 Medium
Permission control vulnerability in the contacts module Impact: Successful exploitation of this vulnerability may affect availability.