CWE-269
Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
CVE-2003-5001 (GCVE-0-2003-5001)
Vulnerability from cvelistv5
- CWE-269 - Improper Privilege Management
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.104 | x_refsource_MISC | |
http://www.computec.ch/mruef/advisories/black_ice_pc_protection_xss_evasion.txt | x_refsource_MISC | |
http://www.cgisecurity.com/articles/xss-faq.shtml | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
ISS | BlackICE PC Protection |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.104" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.computec.ch/mruef/advisories/black_ice_pc_protection_xss_evasion.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cgisecurity.com/articles/xss-faq.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BlackICE PC Protection", "vendor": "ISS", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "value": "Marc Ruef" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ISS BlackICE PC Protection and classified as critical. Affected by this issue is the component Cross Site Scripting Detection. The manipulation as part of POST/PUT/DELETE/OPTIONS Request leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-03T22:16:30", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.104" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.computec.ch/mruef/advisories/black_ice_pc_protection_xss_evasion.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cgisecurity.com/articles/xss-faq.shtml" } ], "tags": [ "unsupported-when-assigned" ], "title": "ISS BlackICE PC Protection Cross Site Scripting Detection privileges management", "x_generator": "vuldb.com", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2003-5001", "REQUESTER": "[email protected]", "STATE": "PUBLIC", "TITLE": "ISS BlackICE PC Protection Cross Site Scripting Detection privileges management" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BlackICE PC Protection", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "ISS" } ] } }, "credit": "Marc Ruef", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in ISS BlackICE PC Protection and classified as critical. Affected by this issue is the component Cross Site Scripting Detection. The manipulation as part of POST/PUT/DELETE/OPTIONS Request leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://vuldb.com/?id.104", "refsource": "MISC", "url": "https://vuldb.com/?id.104" }, { "name": "http://www.computec.ch/mruef/advisories/black_ice_pc_protection_xss_evasion.txt", "refsource": "MISC", "url": "http://www.computec.ch/mruef/advisories/black_ice_pc_protection_xss_evasion.txt" }, { "name": "http://www.cgisecurity.com/articles/xss-faq.shtml", "refsource": "MISC", "url": "http://www.cgisecurity.com/articles/xss-faq.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2003-5001", "datePublished": "2022-03-28T20:45:43", "dateReserved": "2022-01-28T00:00:00", "dateUpdated": "2024-08-08T02:35:17.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4536 (GCVE-0-2013-4536)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1066401 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20210727-0002/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.837Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066401" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210727-0002/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "qemu", "vendor": "n/a", "versions": [ { "status": "affected", "version": "qemu-kvm 1.5.3" } ] } ], "descriptions": [ { "lang": "en", "value": "An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-27T15:06:36", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066401" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210727-0002/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2013-4536", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "qemu", "version": { "version_data": [ { "version_value": "qemu-kvm 1.5.3" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1066401", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066401" }, { "name": "https://security.netapp.com/advisory/ntap-20210727-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210727-0002/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4536", "datePublished": "2021-05-28T16:58:49", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.837Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-125001 (GCVE-0-2014-125001)
Vulnerability from cvelistv5
- CWE-269 - Improper Privilege Management
▼ | URL | Tags |
---|---|---|
http://www.remote-exploit.org/archives/2014/06/03/ride_with_the_devil/ | x_refsource_MISC | |
https://vuldb.com/?id.13428 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Cardo Systems | Scala Rider Q3 |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:10:56.233Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.remote-exploit.org/archives/2014/06/03/ride_with_the_devil/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.13428" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2014-125001", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T16:55:41.321979Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T14:38:41.497Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Scala Rider Q3", "vendor": "Cardo Systems", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "value": "Max Moser" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Cardo Systems Scala Rider Q3. Affected is the file /cardo/api of the Cardo-Updater. Unauthenticated remote code execution with root permissions is possible. Firewalling or disabling the service is recommended." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-24T15:30:33.000Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.remote-exploit.org/archives/2014/06/03/ride_with_the_devil/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.13428" } ], "title": "Cardo Systems Scala Rider Q3 Cardo-Updater api privileges management", "x_generator": "vuldb.com", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2014-125001", "REQUESTER": "[email protected]", "STATE": "PUBLIC", "TITLE": "Cardo Systems Scala Rider Q3 Cardo-Updater api privileges management" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Scala Rider Q3", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cardo Systems" } ] } }, "credit": "Max Moser", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability classified as critical has been found in Cardo Systems Scala Rider Q3. Affected is the file /cardo/api of the Cardo-Updater. Unauthenticated remote code execution with root permissions is possible. Firewalling or disabling the service is recommended." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "8.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.remote-exploit.org/archives/2014/06/03/ride_with_the_devil/", "refsource": "MISC", "url": "http://www.remote-exploit.org/archives/2014/06/03/ride_with_the_devil/" }, { "name": "https://vuldb.com/?id.13428", "refsource": "MISC", "url": "https://vuldb.com/?id.13428" } ] } } } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2014-125001", "datePublished": "2022-05-24T15:30:33.000Z", "dateReserved": "2022-05-24T00:00:00.000Z", "dateUpdated": "2025-04-15T14:38:41.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-15002 (GCVE-0-2016-15002)
Vulnerability from cvelistv5
- CWE-269 - Improper Privilege Management
▼ | URL | Tags |
---|---|---|
https://youtu.be/KKlwi-u6wyA | x_refsource_MISC | |
https://vuldb.com/?id.98355 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
unspecified | MONyog Ultimate |
Version: 6.63 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:47:34.624Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://youtu.be/KKlwi-u6wyA" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.98355" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2016-15002", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T16:56:37.119776Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T14:31:46.703Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "MONyog Ultimate", "vendor": "unspecified", "versions": [ { "status": "affected", "version": "6.63" } ] } ], "credits": [ { "lang": "en", "value": "Mulail Mohamed" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in MONyog Ultimate 6.63. This affects an unknown part of the component Cookie Handler. The manipulation of the argument HasServerEdit/IsAdmin leads to privilege escalation. It is possible to initiate the attack remotely." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-09T06:15:14.000Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://youtu.be/KKlwi-u6wyA" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.98355" } ], "title": "MONyog Ultimate Cookie privileges management", "x_generator": "vuldb.com", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2016-15002", "REQUESTER": "[email protected]", "STATE": "PUBLIC", "TITLE": "MONyog Ultimate Cookie privileges management" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MONyog Ultimate", "version": { "version_data": [ { "version_value": "6.63" } ] } } ] }, "vendor_name": "" } ] } }, "credit": "Mulail Mohamed", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability, which was classified as critical, was found in MONyog Ultimate 6.63. This affects an unknown part of the component Cookie Handler. The manipulation of the argument HasServerEdit/IsAdmin leads to privilege escalation. It is possible to initiate the attack remotely." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "7.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://youtu.be/KKlwi-u6wyA", "refsource": "MISC", "url": "https://youtu.be/KKlwi-u6wyA" }, { "name": "https://vuldb.com/?id.98355", "refsource": "MISC", "url": "https://vuldb.com/?id.98355" } ] } } } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2016-15002", "datePublished": "2022-06-09T06:15:14.000Z", "dateReserved": "2022-06-05T00:00:00.000Z", "dateUpdated": "2025-04-15T14:31:46.703Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9489 (GCVE-0-2016-9489)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9489.html | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2017/Apr/9 | mailing-list, x_refsource_FULLDISC | |
https://www.securityfocus.com/bid/97394/ | vdb-entry, x_refsource_BID |
Vendor | Product | Version | ||
---|---|---|---|---|
ManageEngine | Applications Manager |
Version: 12 Version: 13 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:38.431Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9489.html" }, { "name": "20170404 ManageEngine Applications Manager Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Apr/9" }, { "name": "97394", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "https://www.securityfocus.com/bid/97394/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Applications Manager", "vendor": "ManageEngine", "versions": [ { "status": "affected", "version": "12" }, { "status": "affected", "version": "13" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Lukasz Juszczyk for reporting this vulnerability." } ], "datePublic": "2017-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In ManageEngine Applications Manager 12 and 13 before build 13200, an authenticated user is able to alter all of their own properties, including own group, i.e. changing their group to one with higher privileges like \"ADMIN\". A user is also able to change properties of another user, e.g. change another user\u0027s password." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-06T20:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9489.html" }, { "name": "20170404 ManageEngine Applications Manager Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Apr/9" }, { "name": "97394", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "https://www.securityfocus.com/bid/97394/" } ], "source": { "discovery": "UNKNOWN" }, "title": "ManageEngine Applications Manager 12 and 13 is vulnerable to privilege escalation and authentication bypass", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2016-9489", "STATE": "PUBLIC", "TITLE": "ManageEngine Applications Manager 12 and 13 is vulnerable to privilege escalation and authentication bypass" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Applications Manager", "version": { "version_data": [ { "affected": "=", "version_affected": "=", "version_name": "12", "version_value": "12" }, { "affected": "=", "version_affected": "=", "version_name": "13", "version_value": "13" } ] } } ] }, "vendor_name": "ManageEngine" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Lukasz Juszczyk for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In ManageEngine Applications Manager 12 and 13 before build 13200, an authenticated user is able to alter all of their own properties, including own group, i.e. changing their group to one with higher privileges like \"ADMIN\". A user is also able to change properties of another user, e.g. change another user\u0027s password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9489.html", "refsource": "CONFIRM", "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9489.html" }, { "name": "20170404 ManageEngine Applications Manager Multiple Vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2017/Apr/9" }, { "name": "97394", "refsource": "BID", "url": "https://www.securityfocus.com/bid/97394/" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-9489", "datePublished": "2018-07-13T20:00:00", "dateReserved": "2016-11-21T00:00:00", "dateUpdated": "2024-08-06T02:50:38.431Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-0932 (GCVE-0-2017-0932)
Vulnerability from cvelistv5
- CWE-269 - Improper Privilege Management ()
Vendor | Product | Version | ||
---|---|---|---|---|
Ubiquiti Networks | EdgeRouter X |
Version: EdgeOS v1.9.1.1 and prior |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:25:17.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/239719" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-security-release-v1-9-7-hotfix-3/ba-p/2054117" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EdgeRouter X", "vendor": "Ubiquiti Networks", "versions": [ { "status": "affected", "version": "EdgeOS v1.9.1.1 and prior" } ] } ], "datePublic": "2017-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Ubiquiti Networks EdgeOS version 1.9.1.1 and prior suffer from an Improper Privilege Management vulnerability due to the lack of validation on the input of the Feature functionality. An attacker with access to an operator (read-only) account and ssh connection to the devices could escalate privileges to admin (root) access in the system." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "Improper Privilege Management (CWE-269)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-22T13:57:01", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/239719" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-security-release-v1-9-7-hotfix-3/ba-p/2054117" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "DATE_PUBLIC": "2017-09-06T00:00:00", "ID": "CVE-2017-0932", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EdgeRouter X", "version": { "version_data": [ { "version_value": "EdgeOS v1.9.1.1 and prior" } ] } } ] }, "vendor_name": "Ubiquiti Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ubiquiti Networks EdgeOS version 1.9.1.1 and prior suffer from an Improper Privilege Management vulnerability due to the lack of validation on the input of the Feature functionality. An attacker with access to an operator (read-only) account and ssh connection to the devices could escalate privileges to admin (root) access in the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Privilege Management (CWE-269)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/239719", "refsource": "MISC", "url": "https://hackerone.com/reports/239719" }, { "name": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-security-release-v1-9-7-hotfix-3/ba-p/2054117", "refsource": "CONFIRM", "url": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-security-release-v1-9-7-hotfix-3/ba-p/2054117" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2017-0932", "datePublished": "2018-03-22T14:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-17T02:27:44.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-0934 (GCVE-0-2017-0934)
Vulnerability from cvelistv5
- CWE-269 - Improper Privilege Management ()
Vendor | Product | Version | ||
---|---|---|---|---|
Ubiquiti Networks | EdgeRouter X |
Version: EdgeOS v1.9.1 and prior |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:25:17.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/241044" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-release-v1-9-1-1/ba-p/1910524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EdgeRouter X", "vendor": "Ubiquiti Networks", "versions": [ { "status": "affected", "version": "EdgeOS v1.9.1 and prior" } ] } ], "datePublic": "2017-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Ubiquiti Networks EdgeOS version 1.9.1 and prior suffer from an Improper Privilege Management vulnerability due to the lack of protection of the file system leading to sensitive information being exposed. An attacker with access to an operator (read-only) account could escalate privileges to admin (root) access in the system." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "Improper Privilege Management (CWE-269)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-22T13:57:01", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/241044" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-release-v1-9-1-1/ba-p/1910524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "DATE_PUBLIC": "2017-05-01T00:00:00", "ID": "CVE-2017-0934", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EdgeRouter X", "version": { "version_data": [ { "version_value": "EdgeOS v1.9.1 and prior" } ] } } ] }, "vendor_name": "Ubiquiti Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ubiquiti Networks EdgeOS version 1.9.1 and prior suffer from an Improper Privilege Management vulnerability due to the lack of protection of the file system leading to sensitive information being exposed. An attacker with access to an operator (read-only) account could escalate privileges to admin (root) access in the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Privilege Management (CWE-269)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/241044", "refsource": "MISC", "url": "https://hackerone.com/reports/241044" }, { "name": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-release-v1-9-1-1/ba-p/1910524", "refsource": "CONFIRM", "url": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-release-v1-9-1-1/ba-p/1910524" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2017-0934", "datePublished": "2018-03-22T14:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-17T04:23:56.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-0935 (GCVE-0-2017-0935)
Vulnerability from cvelistv5
- CWE-269 - Improper Privilege Management ()
Vendor | Product | Version | ||
---|---|---|---|---|
Ubiquiti Networks | EdgeRouter X |
Version: EdgeOS v1.9.1.1 and prior |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:25:17.246Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/242407" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-security-release-v1-9-7-hotfix-3/ba-p/2054117" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EdgeRouter X", "vendor": "Ubiquiti Networks", "versions": [ { "status": "affected", "version": "EdgeOS v1.9.1.1 and prior" } ] } ], "datePublic": "2017-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Ubiquiti Networks EdgeOS version 1.9.1.1 and prior suffer from an Improper Privilege Management vulnerability due to the lack of protection of the file system leading to sensitive information being exposed. An attacker with access to an operator (read-only) account could escalate privileges to admin (root) access in the system." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "Improper Privilege Management (CWE-269)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-22T13:57:01", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/242407" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-security-release-v1-9-7-hotfix-3/ba-p/2054117" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "DATE_PUBLIC": "2017-09-06T00:00:00", "ID": "CVE-2017-0935", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EdgeRouter X", "version": { "version_data": [ { "version_value": "EdgeOS v1.9.1.1 and prior" } ] } } ] }, "vendor_name": "Ubiquiti Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ubiquiti Networks EdgeOS version 1.9.1.1 and prior suffer from an Improper Privilege Management vulnerability due to the lack of protection of the file system leading to sensitive information being exposed. An attacker with access to an operator (read-only) account could escalate privileges to admin (root) access in the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Privilege Management (CWE-269)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/242407", "refsource": "MISC", "url": "https://hackerone.com/reports/242407" }, { "name": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-security-release-v1-9-7-hotfix-3/ba-p/2054117", "refsource": "CONFIRM", "url": "https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeRouter-software-security-release-v1-9-7-hotfix-3/ba-p/2054117" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2017-0935", "datePublished": "2018-03-22T14:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-17T01:11:19.422Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-12728 (GCVE-0-2017-12728)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-17-250-01 | x_refsource_MISC | |
http://www.securityfocus.com/bid/100668 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | SpiderControl SCADA Web Server |
Version: SpiderControl SCADA Web Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:43:56.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-250-01" }, { "name": "100668", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100668" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SpiderControl SCADA Web Server", "vendor": "n/a", "versions": [ { "status": "affected", "version": "SpiderControl SCADA Web Server" } ] } ], "datePublic": "2017-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "An Improper Privilege Management issue was discovered in SpiderControl SCADA Web Server Version 2.02.0007 and prior. Authenticated, non-administrative local users are able to alter service executables with escalated privileges, which could allow an attacker to execute arbitrary code under the context of the current system services." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-04T09:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-250-01" }, { "name": "100668", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100668" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2017-12728", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SpiderControl SCADA Web Server", "version": { "version_data": [ { "version_value": "SpiderControl SCADA Web Server" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Improper Privilege Management issue was discovered in SpiderControl SCADA Web Server Version 2.02.0007 and prior. Authenticated, non-administrative local users are able to alter service executables with escalated privileges, which could allow an attacker to execute arbitrary code under the context of the current system services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-250-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-250-01" }, { "name": "100668", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100668" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2017-12728", "datePublished": "2017-10-04T07:00:00", "dateReserved": "2017-08-09T00:00:00", "dateUpdated": "2024-08-05T18:43:56.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-20021 (GCVE-0-2017-20021)
Vulnerability from cvelistv5
- CWE-269 - Improper Privilege Management
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2017/Mar/58 | x_refsource_MISC | |
https://vuldb.com/?id.98931 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:45:24.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Mar/58" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.98931" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-20021", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T16:56:29.344061Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T14:29:58.849Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Solar-Log", "vendor": "Solare", "versions": [ { "status": "affected", "version": "2.8.4-56" }, { "status": "affected", "version": "3.5.2-85" } ] } ], "credits": [ { "lang": "en", "value": "T. Weber" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Solare Solar-Log 2.8.4-56/3.5.2-85. This affects an unknown part of the component File Upload. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-09T22:35:54.000Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://seclists.org/fulldisclosure/2017/Mar/58" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.98931" } ], "title": "Solare Solar-Log File Upload privileges management", "x_generator": "vuldb.com", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2017-20021", "REQUESTER": "[email protected]", "STATE": "PUBLIC", "TITLE": "Solare Solar-Log File Upload privileges management" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Solar-Log", "version": { "version_data": [ { "version_value": "2.8.4-56" }, { "version_value": "3.5.2-85" } ] } } ] }, "vendor_name": "Solare" } ] } }, "credit": "T. Weber", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability, which was classified as critical, was found in Solare Solar-Log 2.8.4-56/3.5.2-85. This affects an unknown part of the component File Upload. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "6.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "http://seclists.org/fulldisclosure/2017/Mar/58", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2017/Mar/58" }, { "name": "https://vuldb.com/?id.98931", "refsource": "MISC", "url": "https://vuldb.com/?id.98931" } ] } } } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2017-20021", "datePublished": "2022-06-09T22:35:54.000Z", "dateReserved": "2022-06-05T00:00:00.000Z", "dateUpdated": "2025-04-15T14:29:58.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation ID: MIT-1
Phases: Architecture and Design, Operation
Description:
- Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.
Mitigation ID: MIT-48
Phase: Architecture and Design
Strategy: Separation of Privilege
Description:
- Follow the principle of least privilege when assigning access rights to entities in a software system.
Mitigation ID: MIT-49
Phase: Architecture and Design
Strategy: Separation of Privilege
Description:
- Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.
CAPEC-122: Privilege Abuse
An adversary is able to exploit features of the target that should be reserved for privileged users or administrators but are exposed to use by lower or non-privileged accounts. Access to sensitive information and functionality must be controlled to ensure that only authorized users are able to access these resources.
CAPEC-233: Privilege Escalation
An adversary exploits a weakness enabling them to elevate their privilege and perform an action that they are not supposed to be authorized to perform.
CAPEC-58: Restful Privilege Elevation
An adversary identifies a Rest HTTP (Get, Put, Delete) style permission method allowing them to perform various malicious actions upon server data due to lack of access control mechanisms implemented within the application service accepting HTTP messages.