Vulnerabilities (CVE)

Filtered by CWE-276
Total 1384 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-57852 2025-10-02 N/A 5.2 MEDIUM
A container privilege escalation flaw was found in KServe ModelMesh container images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
CVE-2025-23297 2025-10-02 N/A 7.8 HIGH
NVIDIA Installer for NvAPP for Windows contains a vulnerability in the FrameviewSDK installation process, where an attacker with local unprivileged access could modify files in the Frameview SDK directory. A successful exploit of this vulnerability might lead to escalation of privileges.
CVE-2024-55398 1 4cstrategies 1 Exonaut 2025-10-01 N/A 6.5 MEDIUM
4C Strategies Exonaut before v22.4 was discovered to contain insecure permissions.
CVE-2024-46465 2 Microsoft, Primx 2 Windows, Cryhod 2025-10-01 N/A 7.8 HIGH
By default, dedicated folders of CRYHOD for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of CRYHOD has to be modified to prevent this vulnerability.
CVE-2024-48533 1 Esoftplanner 1 Esoft Planner 2025-10-01 N/A 5.3 MEDIUM
A discrepancy between responses for valid and invalid e-mail accounts in the Forgot your Login? module of eSoft Planner 3.24.08271-USA allows attackers to enumerate valid user e-mail accounts.
CVE-2024-40514 1 Themesbrand 1 Chatvia 2025-09-30 N/A 4.6 MEDIUM
Insecure Permissions vulnerability in themesebrand Chatvia v.5.3.2 allows a remote attacker to escalate privileges via the User profile name and image upload functions.
CVE-2025-55111 2 Bmc, Linux 2 Control-m\/agent, Linux Kernel 2025-09-29 N/A 5.5 MEDIUM
Certain files with overly permissive permissions were identified in the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions as well as in newer versions which were upgraded from an affected version. These files contain keys and passwords relating to SSL files, keystore and policies. An attacker with local access to the system running the Agent can access these files.
CVE-2024-58046 1 Huawei 1 Harmonyos 2025-09-26 N/A 6.2 MEDIUM
Permission management vulnerability in the lock screen module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-46586 1 Huawei 1 Harmonyos 2025-09-26 N/A 5.1 MEDIUM
Permission control vulnerability in the contacts module Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2025-27521 1 Huawei 1 Harmonyos 2025-09-26 N/A 6.8 MEDIUM
Vulnerability of improper access permission in the process management module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2024-58050 1 Huawei 1 Harmonyos 2025-09-26 N/A 6.2 MEDIUM
Vulnerability of improper access permission in the HDC module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-36857 2025-09-26 N/A 3.3 LOW
Rapid7 Appspider Pro versions below 7.5.021, suffer from a broken access control vulnerability in the application's configuration file loading mechanism, whereby an attacker can place files in directories belonging to other users or projects. Affected versions allow standard users to add custom configuration files. These files, which are loaded in alphabetical order, can override or change the settings of the original configuration files, creating a security vulnerability. This issue stems from improper directory access management. This vulnerability was remediated in version 7.5.021 of the product.
CVE-2023-4664 1 Adobe 1 Connect 2025-09-24 N/A 8.8 HIGH
Incorrect Default Permissions vulnerability in Saphira Saphira Connect allows Privilege Escalation.This issue affects Saphira Connect: before 9.
CVE-2025-43595 2 Linux, Msp360 2 Linux Kernel, Backup 2025-09-23 N/A 7.8 HIGH
An insecure file system permissions vulnerability in MSP360 Backup 4.3.1.115 allows a low privileged user to execute commands with root privileges in the 'Online Backup' folder. Upgrade to MSP360 Backup 4.4 (released on 2025-04-22).
CVE-2025-43596 1 Msp360 1 Backup 2025-09-23 N/A 7.8 HIGH
An insecure file system permissions vulnerability in MSP360 Backup 8.0 allows a low privileged user to execute commands with SYSTEM level privileges using a specially crafted file with an arbitrary file backup target. Upgrade to MSP360 Backup 8.1.1.19 (released on 2025-05-15).
CVE-2024-6238 1 Pgadmin 1 Pgadmin 4 2025-09-23 N/A 7.4 HIGH
pgAdmin <= 8.8 has an installation Directory permission issue. Because of this issue, attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.
CVE-2025-10231 1 N-able 1 N-central 2025-09-22 N/A 7.0 HIGH
An Incorrect File Handling Permission bug exists on the N-central Windows Agent and Probe that, in the right circumstances, can allow a local low-level user to run commands with elevated permissions.
CVE-2025-53947 2025-09-19 N/A 7.7 HIGH
A local attacker with low privileges on the Windows system where the software is installed can exploit this vulnerability to corrupt sensitive data. A data folder is created with very weak privileges, allowing any user logged into the Windows system to modify its content.
CVE-2025-57625 2025-09-17 N/A 8.8 HIGH
CYRISMA Sensor before 444 for Windows has an Insecure Folder and File Permissions vulnerability. A low-privileged user can abuse these issues to escalate privileges and execute arbitrary code in the context of NT AUTHORITY\SYSTEM by replacing DataSpotliteAgent.exe or any other binaries called by the Cyrisma_Agent service when it starts
CVE-2025-8672 2 Apple, Gimp 2 Macos, Gimp 2025-09-12 N/A 7.8 HIGH
MacOS version of GIMP bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle. An attacker with local user access can invoke this interpreter with arbitrary commands or scripts, leveraging the application's previously granted TCC permissions to access user's files in privacy-protected folders without triggering user prompts. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of GIMP, potentially disguising attacker's malicious intent. This issue has been fixed in 3.1.4.2 version of GIMP.