Vulnerabilities (CVE)

Filtered by CWE-284
Total 3968 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-45618 1 Huangjian888 1 Jeeweb-mybatis-springboot 2025-10-21 N/A 6.5 MEDIUM
Incorrect access control in the component /admin/sys/datasource/ajaxList of jeeweb-mybatis-springboot v0.0.1.RELEASE allows attackers to access sensitive information via a crafted payload.
CVE-2025-2334 1 274056675 1 Springboot-openai-chatgpt 2025-10-21 5.5 MEDIUM 5.4 MEDIUM
A vulnerability classified as problematic has been found in 274056675 springboot-openai-chatgpt e84f6f5. This affects the function deleteChat of the file /api/mjkj-chat/chat/ai/delete/chat of the component Chat History Handler. The manipulation of the argument chatListId leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-51529 1 Followmedarling 1 Cookies And Content Security Policy 2025-10-21 N/A 5.3 MEDIUM
Incorrect Access Control in the AJAX endpoint functionality in jonkastonka Cookies and Content Security Policy plugin through version 2.29 allows remote attackers to cause a denial of service (database server resource exhaustion) via unlimited database write operations to the wp_ajax_nopriv_cacsp_insert_consent_data endpoint.
CVE-2025-55630 1 Reolink 2 Smart 2k\+ Plug-in Wi-fi Video Doorbell With Chime, Smart 2k\+ Plug-in Wi-fi Video Doorbell With Chime Firmware 2025-10-21 N/A 7.3 HIGH
A discrepancy in the error message returned by the login function of Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3.0.0.4662_2503122283 when entering the wrong username and password allows attackers to enumerate existing accounts.
CVE-2025-0402 1 1902756969 1 Reggie 2025-10-21 6.5 MEDIUM 6.3 MEDIUM
A vulnerability classified as critical was found in 1902756969 reggie 1.0. Affected by this vulnerability is the function upload of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-0403 1 1902756969 1 Reggie 2025-10-21 5.0 MEDIUM 5.3 MEDIUM
A vulnerability, which was classified as problematic, has been found in 1902756969 reggie 1.0. Affected by this issue is some unknown functionality of the file /user/sendMsg of the component Phone Number Validation Handler. The manipulation of the argument code leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-11660 1 Oranbyte 1 School Management System 2025-10-20 7.5 HIGH 7.3 HIGH
A vulnerability has been found in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59. Affected by this issue is some unknown functionality of the file /assets/uploadSllyabus.php. Such manipulation of the argument File leads to unrestricted upload. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable.
CVE-2025-58724 1 Microsoft 1 Azure Connected Machine Agent 2025-10-20 N/A 7.8 HIGH
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2025-47989 1 Microsoft 1 Azure Connected Machine Agent 2025-10-20 N/A 7.0 HIGH
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2025-25004 1 Microsoft 17 Powershell, Windows 10 1507, Windows 10 1607 and 14 more 2025-10-20 N/A 7.3 HIGH
Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.
CVE-2025-9842 1 Das 1 Parking Management System 2025-10-20 5.0 MEDIUM 5.3 MEDIUM
A vulnerability was detected in Das Parking Management System 停车场管理系统 6.2.0. This impacts an unknown function of the file /Operator/Search. The manipulation results in information disclosure. The attack may be performed from remote. The exploit is now public and may be used.
CVE-2025-9843 1 Das 1 Parking Management System 2025-10-20 5.0 MEDIUM 5.3 MEDIUM
A flaw has been found in Das Parking Management System 停车场管理系统 6.2.0. Affected is an unknown function of the file /Operator/FindAll. This manipulation causes information disclosure. It is possible to initiate the attack remotely. The exploit has been published and may be used.
CVE-2025-54914 1 Microsoft 1 Azure Networking 2025-10-20 N/A 10.0 CRITICAL
Azure Networking Elevation of Privilege Vulnerability
CVE-2025-7106 1 Librechat 1 Librechat 2025-10-20 N/A 5.3 MEDIUM
danny-avila/librechat is affected by an authorization bypass vulnerability due to improper access control checks. The `checkAccess` function in `api/server/middleware/roles/access.js` uses `permissions.some()` to validate permissions, which incorrectly grants access if only one of multiple required permissions is present. This allows users with the 'USER' role to create agents despite having `CREATE: false` permission, as the check for `['USE', 'CREATE']` passes with just `USE: true`. This vulnerability affects other permission checks as well, such as `PROMPTS`. The issue is present in all versions prior to the fix.
CVE-2025-59951 1 Termix 1 Termix 2025-10-20 N/A 9.1 CRITICAL
Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. The official Docker image for Termix versions 1.5.0 and below, due to being configured with an Nginx reverse proxy, causes the backend to retrieve the proxy's IP instead of the client's IP when using the req.ip method. This results in isLocalhost always returning True. Consequently, the /ssh/db/host/internal endpoint can be accessed directly without login or authentication. This endpoint records the system's stored SSH host information, including addresses, usernames, and passwords, posing an extremely high security risk. Users who use the official Termix docker image, build their own image using the official dockerfile, or utilize reverse proxy functionality will be affected by this vulnerability. This issue is fixed in version 1.6.0.
CVE-2021-46304 1 Siemens 8 Cp-8000 Master Module With I\/o -25\/\+70, Cp-8000 Master Module With I\/o -25\/\+70 Firmware, Cp-8000 Master Module With I\/o -40\/\+70 and 5 more 2025-10-20 N/A 7.5 HIGH
A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions), CP-8021 MASTER MODULE (All versions), CP-8022 MASTER MODULE WITH GPRS (All versions). The component allows to activate a web server module which provides unauthenticated access to its web pages. This could allow an attacker to retrieve debug-level information from the component such as internal network topology or connected systems.
CVE-2025-45424 1 Xinference 1 Xinference 2025-10-18 N/A 5.3 MEDIUM
Incorrect access control in Xinference before v1.4.0 allows attackers to access the Web GUI without authentication.
CVE-2025-45157 1 Splashin 1 Splashin 2025-10-17 N/A 6.5 MEDIUM
Insecure permissions in Splashin iOS v2.0 allow unauthorized attackers to access location data for specific users.
CVE-2025-50897 1 Boom-core 1 Boomv 2025-10-17 N/A 4.3 MEDIUM
A vulnerability exists in riscv-boom SonicBOOM 1.2 (BOOMv1.2) processor implementation, where valid virtual-to-physical address translations configured with write permissions (PTE_W) in SV39 mode may incorrectly trigger a Store/AMO access fault during store instructions (sd). This occurs despite the presence of proper page table entries and valid memory access modes. The fault is reproducible when transitioning into virtual memory and attempting store operations in mapped kernel memory, indicating a potential flaw in the MMU, PMP, or memory access enforcement logic. This may cause unexpected kernel panics or denial of service in systems using BOOMv1.2.
CVE-2025-9804 2025-10-17 N/A 9.6 CRITICAL
An improper access control vulnerability exists in multiple WSO2 products due to insufficient permission enforcement in certain internal SOAP Admin Services and System REST APIs. A low-privileged user may exploit this flaw to perform unauthorized operations, including accessing server-level information. This vulnerability affects only internal administrative interfaces. APIs exposed through the WSO2 API Manager's API Gateway remain unaffected.