Vulnerabilities (CVE)

Filtered by CWE-284
Total 2419 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-30582 2024-11-21 N/A 5.3 MEDIUM
A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument. This flaw arises from an inadequate permission model that fails to restrict file watching through the fs.watchFile API. As a result, malicious actors can monitor files that they do not have explicit read access to. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
CVE-2023-2946 1 Open-emr 1 Openemr 2024-11-21 N/A 8.1 HIGH
Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.
CVE-2023-2944 1 Open-emr 1 Openemr 2024-11-21 N/A 5.4 MEDIUM
Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.
CVE-2023-2903 1 Nfine 1 Nfine Rapid Development Platform 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A vulnerability classified as problematic has been found in NFine Rapid Development Platform 20230511. This affects an unknown part of the file /SystemManage/Role/GetGridJson?keyword=&page=1&rows=20. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229977 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2023-2674 1 Open-emr 1 Openemr 2024-11-21 N/A 4.3 MEDIUM
Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.
CVE-2023-2202 1 Rosariosis 1 Rosariosis 2024-11-21 N/A 6.5 MEDIUM
Improper Access Control in GitHub repository francoisjacquet/rosariosis prior to 10.9.3.
CVE-2023-29513 1 Xwiki 1 Xwiki 2024-11-21 N/A 5.0 MEDIUM
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. If guest has view right on any document. It's possible to create a new user using the `distribution/firstadminuser.wiki` in the wrong context. This vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.1. There is no known workaround other than upgrading.
CVE-2023-28844 1 Nextcloud 1 Nextcloud Server 2024-11-21 N/A 5.7 MEDIUM
Nextcloud server is an open source home cloud implementation. In affected versions users that should not be able to download a file can still download an older version and use that for uncontrolled distribution. This issue has been addressed in versions 24.0.10 and 25.0.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-28715 1 Intel 1 Oneapi 2024-11-21 N/A 5.0 MEDIUM
Improper access control in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.2 may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-28714 2 Intel, Microsoft 2 Proset\/wireless Wifi, Windows 2024-11-21 N/A 8.2 HIGH
Improper access control in firmware for some Intel(R) PROSet/Wireless WiFi software for Windows before version 22.220 HF (Hot Fix) may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2023-28645 1 Nextcloud 1 Richdocuments 2024-11-21 N/A 5.7 MEDIUM
Nextcloud richdocuments is a Nextcloud app integrating the office suit Collabora Online. In affected versions the secure view feature of the rich documents app can be bypassed by using unprotected internal API endpoint of the rich documents app. It is recommended that the Nextcloud Office app (richdocuments) is upgraded to 8.0.0-beta.1, 7.0.2 or 6.3.2. Users unable to upgrade may mitigate the issue by taking steps to restrict the ability to download documents. This includes ensuring that the `WOPI configuration` is configured to only serve documents between Nextcloud and Collabora. It is highly recommended to define the list of Collabora server IPs as the allow list within the Office admin settings of Nextcloud.
CVE-2023-28443 1 Monospace 1 Directus 2024-11-21 N/A 4.2 MEDIUM
Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 9.23.3, the `directus_refresh_token` is not redacted properly from the log outputs and can be used to impersonate users without their permission. This issue is patched in version 9.23.3.
CVE-2023-28372 1 Purestorage 1 Purity 2024-11-21 N/A 6.5 MEDIUM
A flaw exists in FlashBlade Purity (OE) Version 4.1.0 whereby a user with privileges to extend an object’s retention period can affect the availability of the object lock.
CVE-2023-28312 1 Microsoft 1 Azure Machine Learning 2024-11-21 N/A 6.5 MEDIUM
Azure Machine Learning Information Disclosure Vulnerability
CVE-2023-28300 1 Microsoft 1 Azure Service Connector 2024-11-21 N/A 7.5 HIGH
Azure Service Connector Security Feature Bypass Vulnerability
CVE-2023-28246 1 Microsoft 3 Windows 11 21h2, Windows 11 22h2, Windows Server 2022 2024-11-21 N/A 7.8 HIGH
Windows Registry Elevation of Privilege Vulnerability
CVE-2023-28070 1 Dell 1 Alienware Command Center 2024-11-21 N/A 6.7 MEDIUM
Alienware Command Center Application, versions 5.5.43.0 and prior, contain an improper access control vulnerability. A local malicious user could potentially exploit this vulnerability during installation or update process leading to privilege escalation.
CVE-2023-28066 1 Dell 1 Os Recovery Tool 2024-11-21 N/A 7.3 HIGH
Dell OS Recovery Tool, versions 2.2.4013 and 2.3.7012.0, contain an Improper Access Control Vulnerability. A local authenticated non-administrator user could potentially exploit this vulnerability in order to elevate privileges on the system.
CVE-2023-27303 1 Intel 1 Thunderbolt Dch Driver 2024-11-21 N/A 3.8 LOW
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2023-27301 1 Intel 1 Thunderbolt Dch Driver 2024-11-21 N/A 4.2 MEDIUM
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.