Vulnerabilities (CVE)

Filtered by CWE-693
Total 348 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-42938 1 Apple 1 Itunes 2025-03-28 N/A 7.8 HIGH
A logic issue was addressed with improved checks. This issue is fixed in iTunes 12.13.1 for Windows. A local attacker may be able to elevate their privileges.
CVE-2024-0014 1 Google 1 Android 2025-03-28 N/A 7.8 HIGH
In startInstall of UpdateFetcher.java, there is a possible way to trigger a malicious config update due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-1671 1 Google 1 Chrome 2025-03-27 N/A 6.5 MEDIUM
Inappropriate implementation in Site Isolation in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-38874 2025-03-24 N/A 5.4 MEDIUM
An issue was discovered in the events2 (aka Events 2) extension before 8.3.8 and 9.x before 9.0.6 for TYPO3. Missing access checks in the management plugin lead to an insecure direct object reference (IDOR) vulnerability with the potential to activate or delete various events for unauthenticated users.
CVE-2022-48290 1 Huawei 1 Harmonyos 2025-03-24 N/A 9.1 CRITICAL
The phone-PC collaboration module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality and integrity.
CVE-2022-48287 1 Huawei 2 Emui, Harmonyos 2025-03-24 N/A 7.5 HIGH
The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data integrity.
CVE-2023-0141 1 Google 1 Chrome 2025-03-20 N/A 4.3 MEDIUM
Insufficient policy enforcement in CORS in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
CVE-2023-0131 1 Google 1 Chrome 2025-03-20 N/A 6.5 MEDIUM
Inappropriate implementation in in iframe Sandbox in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to bypass file download restrictions via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-5691 1 Mozilla 3 Firefox, Firefox Esr, Thunderbird 2025-03-19 N/A 4.7 MEDIUM
By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
CVE-2023-25765 1 Jenkins 1 Email Extension 2025-03-19 N/A 9.9 CRITICAL
In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
CVE-2022-48219 2025-03-19 N/A 6.4 MEDIUM
Potential vulnerabilities have been identified in certain HP Desktop PC products using the HP TamperLock feature, which might allow intrusion detection bypass via a physical attack. HP is releasing firmware and guidance to mitigate these potential vulnerabilities.
CVE-2024-0029 1 Google 1 Android 2025-03-14 N/A 7.8 HIGH
In multiple files, there is a possible way to capture the device screen when disallowed by device policy due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-33150 1 Microsoft 3 365 Apps, Office, Word 2025-02-28 N/A 9.6 CRITICAL
Microsoft Office Security Feature Bypass Vulnerability
CVE-2021-31982 1 Microsoft 1 Edge Chromium 2025-02-28 N/A 8.8 HIGH
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
CVE-2023-38157 1 Microsoft 1 Edge Chromium 2025-02-28 N/A 6.5 MEDIUM
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
CVE-2023-29354 1 Microsoft 1 Edge Chromium 2025-02-28 N/A 4.7 MEDIUM
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
CVE-2023-28286 1 Microsoft 1 Edge Chromium 2025-02-28 N/A 6.1 MEDIUM
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
CVE-2023-28284 1 Microsoft 1 Edge 2025-02-28 N/A 4.3 MEDIUM
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
CVE-2024-13794 1 Wpplugins 1 Hide My Wp Ghost 2025-02-25 N/A 5.3 MEDIUM
The WP Ghost (Hide My WP Ghost) – Security & Firewall plugin for WordPress is vulnerable to Login Page Dislcosure in all versions up to, and including, 5.3.02. This is due to the plugin not properly restricting the /wp-register.php path. This makes it possible for unauthenticated attackers to discover the hidden login page location.
CVE-2023-21024 1 Google 1 Android 2025-02-25 N/A 7.8 HIGH
In maybeFinish of FallbackHome.java, there is a possible delay of lockdown screen due to logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-246543238