CWE-281: CWE-281
Yearly Trend
Top Affected Vendors
All CWE-281 CVEs (89)
This vulnerability allows any Android application without permissions to place phone calls without user interaction by sending a crafted intent to the...
Jan 6, 2025This CVE allows privilege escalation in XWiki Platform where the {{wikimacrocontent}} executes content with wiki macro author rights instead of caller...
Mar 12, 2021This vulnerability in the 3scale Developer Portal allows attackers to modify read-only or hidden fields when creating or updating accounts. This could...
Nov 6, 2025A vulnerability in Salesforce OmniStudio DataMapper allows unauthorized access to encrypted data due to improper permission preservation. This affects...
Jun 10, 2025A permissions preservation vulnerability in Salesforce OmniStudio FlexCards allows unauthorized access to encrypted data. This affects Salesforce cust...
Jun 10, 2025This CVE describes a logic flaw in macOS that allows attackers to bypass file system protections and access restricted areas. It affects macOS Ventura...
Jan 27, 2025This vulnerability in the Should I Answer? Android app allows any installed application without permissions to place phone calls without user interact...
Dec 4, 2024This vulnerability allows a malicious website to bypass same-origin policy restrictions via embedded content, potentially accessing sensitive data fro...
Oct 29, 2024This CVE describes a privilege escalation vulnerability in macOS where a non-privileged user can modify restricted network settings. This affects macO...
Sep 17, 2024This macOS vulnerability allows camera extensions to bypass intended restrictions and access the internet without proper authorization. It affects mac...
Sep 17, 2024CVE-2021-3523 is a connection reuse vulnerability in 3Scale APICast that allows attackers to bypass API security restrictions when multiple APIs are h...
Apr 27, 2022This CVE describes an Improper Preservation of Permissions vulnerability in Huawei smartphones running HarmonyOS. It allows unauthorized access to sen...
Nov 23, 2021This vulnerability in JetBrains UpSource allows application passwords to remain valid after they should have been revoked, potentially enabling unauth...
May 11, 2021This vulnerability allows administrators with PowerShell access to disable Zscaler Internet Access (ZIA) protection on Windows systems. It affects org...
Aug 6, 2024This CVE describes a sandbox escape vulnerability in macOS where third-party app extensions may not receive proper sandbox restrictions. This could al...
Jul 29, 2024This vulnerability in Brocade Fabric OS allows local users to overwrite system files using the 'less' command. It affects Brocade SAN switches running...
Aug 2, 2023This vulnerability allows attackers to craft malicious Flattened Image Tree (FIT) structures that overwrite memory in U-Boot's Secondary Program Loade...
Oct 17, 2023This vulnerability allows users with the security_admin_local role in Couchbase Server to create new users with admin privileges, bypassing intended r...
Jan 27, 2025Insecure permissions in Silicon Labs Z-Wave Series 700 and 800 controllers allow attackers to cause denial of service by repeatedly sending crafted pa...
Dec 10, 2024This vulnerability allows attackers to manipulate wakeup intervals of Z-Wave end devices in controller memory, potentially disrupting communication be...
Dec 10, 2024This vulnerability in Firefox, Firefox ESR, and Thunderbird allows attackers to trick users into granting WebAuthn permissions via manipulated popup n...
May 14, 2024This CVE describes a privilege escalation vulnerability in Teradata Database systems during OS migration from SLES 12 SP2/3 to SLES 15 SP2. User accou...
Jan 8, 2025This vulnerability in lakeFS allows privilege inheritance when reusing usernames. When a deleted user's username is reused for a new account, the new ...
Nov 26, 2024This vulnerability in OpenHarmony allows a local attacker to bypass permission checks and access sensitive information they shouldn't have access to. ...
Jun 8, 2025This vulnerability in OpenHarmony allows a local attacker to bypass permission checks and access sensitive information they shouldn't have access to. ...
Jun 8, 2025This CVE describes a macOS vulnerability where applications could bypass permission checks to access protected user data. It affects macOS systems bef...
Jan 27, 2025This CVE describes a permissions vulnerability in macOS that allows applications to bypass intended restrictions and access protected user data. It af...
Sep 17, 2024This macOS vulnerability allows applications to bypass intended permission restrictions and access sensitive user data. It affects macOS systems befor...
Sep 17, 2024This CVE describes a permissions vulnerability in macOS that allows unauthorized applications to access a user's Photos Library. The issue affects mac...
Sep 17, 2024This vulnerability in Oracle Workflow (part of Oracle E-Business Suite) allows authenticated attackers with low privileges to modify or delete some da...
Jan 21, 2025This vulnerability in RuoYi v4.8.0 allows administrators to cause a Denial of Service (DoS) by duplicating login names during password resets. The att...
Jan 29, 2025This vulnerability in Tuleap's document manager allows users to retain edit or manage permissions on sub-items when permissions are being restricted v...
Jul 22, 2024This vulnerability in Android's permission management system allows attackers to trick users into granting incorrect permissions through permission ov...
Sep 4, 2025The snowflake-connector-nodejs driver has a vulnerability where file permission checks for temporary credential cache can be bypassed. An attacker wit...
Jan 29, 2025CVE-2023-32199 is an improper preservation of permissions vulnerability in Rancher Manager where users retain cluster access after their custom Global...
Oct 29, 2025This CVE describes an information disclosure vulnerability in Zabbix where unauthenticated users can access host statistics through the System Informa...
Aug 12, 2024This CVE describes a broken access control vulnerability in the WordPress ReviewX plugin. It allows unauthorized users to perform actions they shouldn...
May 3, 2024This vulnerability allows any Android application installed on the same device to place phone calls without user interaction by sending a crafted inte...
Nov 7, 2024This CVE describes an improper preservation of permissions vulnerability in NetworkManager where the daemon running with root privileges can access fi...
Jan 26, 2026About CWE-281 (CWE-281)
Our database tracks 89 CVEs classified as CWE-281, with 14 rated critical and 53 rated high severity. The average CVSS score for CWE-281 vulnerabilities is 7.6.
External reference: View CWE-281 on MITRE CWE →
Monitor CWE-281 Vulnerabilities
Get alerted when new CWE-281 CVEs affect your infrastructure.
Start Monitoring Free