Show filters
829 Total Results
Displaying 241-250 of 829
Sort by:
Attacker Value
Unknown

CVE-2023-31453

Disclosure Date: May 22, 2023 (last updated February 25, 2025)
Incorrect Permission Assignment for Critical Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0. The attacker can delete others' subscriptions, even if they are not the owner of the deleted subscription. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/7949 https://github.com/apache/inlong/pull/7949
Attacker Value
Unknown

CVE-2023-33251

Disclosure Date: May 21, 2023 (last updated February 25, 2025)
When Akka HTTP before 10.5.2 accepts file uploads via the FileUploadDirectives.fileUploadAll directive, the temporary file it creates has too weak permissions: it is readable by other users on Linux or UNIX, a similar issue to CVE-2022-41946.
Attacker Value
Unknown

CVE-2023-1692

Disclosure Date: May 20, 2023 (last updated February 25, 2025)
The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality.
Attacker Value
Unknown

CVE-2023-31871

Disclosure Date: May 18, 2023 (last updated February 25, 2025)
OpenText Documentum Content Server before 23.2 has a flaw that allows for privilege escalation from a non-privileged Documentum user to root. The software comes prepackaged with a root owned SUID binary dm_secure_writer. The binary has security controls in place preventing creation of a file in a non-owned directory, or as the root user. However, these controls can be carefully bypassed to allow for an arbitrary file write as root.
Attacker Value
Unknown

CVE-2023-33004

Disclosure Date: May 16, 2023 (last updated February 24, 2025)
A missing permission check in Jenkins Tag Profiler Plugin 0.2 and earlier allows attackers with Overall/Read permission to reset profiler statistics.
Attacker Value
Unknown

CVE-2023-32992

Disclosure Date: May 16, 2023 (last updated February 24, 2025)
Missing permission checks in Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML, or parse a local file on the Jenkins controller as XML.
Attacker Value
Unknown

CVE-2023-32990

Disclosure Date: May 16, 2023 (last updated February 24, 2025)
A missing permission check in Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method.
Attacker Value
Unknown

CVE-2023-32986

Disclosure Date: May 16, 2023 (last updated February 24, 2025)
Jenkins File Parameter Plugin 285.v757c5b_67a_c25 and earlier does not restrict the name (and resulting uploaded file name) of Stashed File Parameters, allowing attackers with Item/Configure permission to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.
Attacker Value
Unknown

CVE-2023-32979

Disclosure Date: May 16, 2023 (last updated February 24, 2025)
Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.
Attacker Value
Unknown

CVE-2023-32303

Disclosure Date: May 12, 2023 (last updated February 24, 2025)
Planet is software that provides satellite data. The secret file stores the user's Planet API authentication information. It should only be accessible by the user, but before version 2.0.1, its permissions allowed the user's group and non-group to read the file as well. This issue was patched in version 2.0.1. As a workaround, set the secret file permissions to only user read/write by hand.