Vulnerabilities (CVE)

Filtered by CWE-269
Total 1970 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-39782 1 Google 1 Android 2024-11-21 4.6 MEDIUM 7.8 HIGH
In Telephony, there is a possible unauthorized modification of the PLMN SIM file due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-202760015
CVE-2021-39772 1 Google 1 Android 2024-11-21 5.8 MEDIUM 8.8 HIGH
In Bluetooth, there is a possible way to access the a2dp audio control switch due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-181962322
CVE-2021-39192 1 Ghost 1 Ghost 2024-11-21 6.5 MEDIUM 6.5 MEDIUM
Ghost is a Node.js content management system. An error in the implementation of the limits service between versions 4.0.0 and 4.9.4 allows all authenticated users (including contributors) to view admin-level API keys via the integrations API endpoint, leading to a privilege escalation vulnerability. This issue is patched in Ghost version 4.10.0. As a workaround, disable all non-Administrator accounts to prevent API access. It is highly recommended to regenerate all API keys after patching or applying the workaround.
CVE-2021-39168 1 Openzeppelin 1 Contracts 2024-11-21 7.5 HIGH 10.0 CRITICAL
OpenZepplin is a library for smart contract development. In affected versions a vulnerability in TimelockController allowed an actor with the executor role to escalate privileges. Further details about the vulnerability will be disclosed at a later date. As a workaround revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.
CVE-2021-39167 1 Openzeppelin 1 Contracts 2024-11-21 7.5 HIGH 10.0 CRITICAL
OpenZepplin is a library for smart contract development. In affected versions a vulnerability in TimelockController allowed an actor with the executor role to escalate privileges. Further details about the vulnerability will be disclosed at a later date. As a workaround revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.
CVE-2021-38671 1 Microsoft 9 Windows 10, Windows 7, Windows 8.1 and 6 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2021-38667 1 Microsoft 9 Windows 10, Windows 7, Windows 8.1 and 6 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2021-38639 1 Microsoft 9 Windows 10, Windows 7, Windows 8.1 and 6 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Win32k Elevation of Privilege Vulnerability
CVE-2021-38638 1 Microsoft 9 Windows 10, Windows 7, Windows 8.1 and 6 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2021-38634 1 Microsoft 4 Windows 10, Windows Server 2016, Windows Server 2019 and 1 more 2024-11-21 7.2 HIGH 7.1 HIGH
Microsoft Windows Update Client Elevation of Privilege Vulnerability
CVE-2021-38633 1 Microsoft 9 Windows 10, Windows 7, Windows 8.1 and 6 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2021-38630 1 Microsoft 9 Windows 10, Windows 7, Windows 8.1 and 6 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Event Tracing Elevation of Privilege Vulnerability
CVE-2021-38628 1 Microsoft 9 Windows 10, Windows 7, Windows 8.1 and 6 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2021-38626 1 Microsoft 1 Windows Server 2008 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Kernel Elevation of Privilege Vulnerability
CVE-2021-38625 1 Microsoft 1 Windows Server 2008 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Kernel Elevation of Privilege Vulnerability
CVE-2021-38140 1 Set User Project 1 Set User 2024-11-21 7.5 HIGH 9.8 CRITICAL
The set_user extension module before 2.0.1 for PostgreSQL allows a potential privilege escalation using RESET SESSION AUTHORIZATION after set_user().
CVE-2021-37941 1 Elastic 1 Apm Agent 2024-11-21 4.4 MEDIUM 7.8 HIGH
A local privilege escalation issue was found with the APM Java agent, where a user on the system could attach a malicious file to an application running with the APM Java agent. Using this vector, a malicious or compromised user account could use the agent to run commands at a higher level of permissions than they possess. This vulnerability affects users that have set up the agent via the attacher cli 3, the attach API 2, as well as users that have enabled the profiling_inferred_spans_enabled option
CVE-2021-37911 1 Benq 2 Eh600, Eh600 Firmware 2024-11-21 8.3 HIGH 8.8 HIGH
The management interface of BenQ smart wireless conference projector does not properly control user's privilege. Attackers can access any system directory of this device through the interface and execute arbitrary commands if he enters the local subnetwork.
CVE-2021-37852 1 Eset 9 Endpoint Antivirus, Endpoint Security, File Security and 6 more 2024-11-21 7.2 HIGH 7.8 HIGH
ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.
CVE-2021-37627 1 Contao 1 Contao 2024-11-21 6.5 MEDIUM 8.0 HIGH
Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form generator. All users are advised to update to Contao 4.4.56, 4.9.18 or 4.11.7. As a workaround users may disable the form generator or disable the login for untrusted back end users.