CWE-732: CWE-732
Yearly Trend
Top Affected Vendors
All CWE-732 CVEs (310)
This critical vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform's Internet Communication Framework allows attackers to bypass access contro...
Jan 14, 2025This vulnerability allows attackers to access functionality they shouldn't have permission to use in the Apinizer Management Console due to incorrect ...
Jul 18, 2024This vulnerability in SAP BusinessObjects Business Intelligence Platform allows authenticated attackers to view sensitive information that should be r...
Sep 12, 2023This vulnerability allows remote authenticated managers in Plone to perform arbitrary disk I/O operations via crafted keyword arguments to the ReStruc...
May 21, 2021An unauthenticated remote code execution vulnerability in Juniper PTX Series routers allows attackers to execute arbitrary code as root by exploiting ...
Feb 25, 2026Firefox for Android versions before 141 allow sandboxed iframes without the 'allow-downloads' attribute to initiate downloads, bypassing security rest...
Aug 19, 2025A critical permissions bypass vulnerability in macOS allows malicious applications to modify protected file system areas. This affects macOS Ventura, ...
Jul 30, 2025The Memory Management Module in NASA cFS Aquila has insecure permissions that allow attackers to gain remote code execution on affected systems. This ...
Mar 25, 2025CVE-2024-57520 is an insecure permissions vulnerability in Asterisk v22 that allows directory traversal via the action_createconfig function. This cou...
Feb 5, 2025CVE-2024-41647 is an insecure permissions vulnerability in ROS2 navigation2's nav2_mppi_controller component that allows attackers to execute arbitrar...
Dec 6, 2024This vulnerability allows attackers to launch any unexported component in the com.transsion.aivoiceassistant mobile app due to improper permission con...
Oct 16, 2024This CVE describes an insecure permissions vulnerability in Ruijie RG-NBS2009G-P switches running RGOS v10.4(1)P2 Release (9736). It allows remote att...
Oct 2, 2024This vulnerability allows attackers to abuse incorrect permissions on Vertica agent API keys, potentially gaining unauthorized access or elevated priv...
Oct 2, 2024This vulnerability in the BoomPlayer mobile application allows attackers to take over user accounts due to improper permission configuration. It affec...
Sep 14, 2024This CVE describes an improper permission configuration vulnerability in the Transsion CarlCare mobile application that could allow unauthorized acces...
Jun 17, 2024This vulnerability in Gentoo's Slurm ebuild allows the slurm user to gain ownership of root-owned files through improper chown calls during package in...
Jan 15, 2024This critical vulnerability in PHOENIX CONTACT industrial automation software allows unauthenticated remote attackers to upload malicious code and gai...
Dec 14, 2023This critical vulnerability allows remote unauthenticated attackers to gain full administrative access to affected PHOENIX CONTACT classic line device...
Dec 14, 2023This vulnerability allows attackers with physical or application access to an iOS device running Devolutions Remote Desktop Manager to bypass client-s...
Dec 12, 2023This vulnerability allows attackers to access sensitive configuration files in OPNsense firewalls due to insecure directory permissions. Attackers can...
Aug 9, 2023PublicCMS versions up to V4.0.202302 have insecure permissions that allow attackers to bypass authentication and gain unauthorized access. This affect...
Jun 15, 2023CVE-2023-24205 is a critical remote code execution vulnerability in Clash for Windows that allows attackers to execute arbitrary code by overwriting t...
Feb 23, 2023CVE-2021-29396 is an authentication bypass vulnerability in NorthStar Club Management software that allows remote attackers to access administrative f...
Feb 4, 2022This vulnerability in Nagios XI 5.7.5 and earlier allows local attackers to escalate privileges by exploiting insecure temporary directory permissions...
May 24, 2021CVE-2020-11831 is a critical vulnerability in OvoiceManager that allows arbitrary file writes due to improper system permissions. Attackers can exploi...
Nov 19, 2020CVE-2020-12842 is a critical privilege escalation vulnerability in iSmartgate PRO garage door controller software. Attackers can append arbitrary PHP ...
Sep 24, 2020CVE-2020-12838 allows attackers to escalate privileges by appending malicious PHP code to the /cron/mailAdmin.php file in iSmartgate PRO garage door c...
Sep 24, 2020This vulnerability in Zyxel VMG5313-B30B routers allows regular users to create new accounts with administrative privileges by manipulating JSON param...
Sep 2, 2020This vulnerability in Google Chrome's Mojo IPC system on Windows allows a remote attacker to escape the browser sandbox via a malicious file. Attacker...
Aug 22, 2025This vulnerability allows unauthorized GitLab users to attach malicious runners to any project via a GraphQL endpoint. It affects GitLab Community Edi...
May 8, 2023This vulnerability in Havelsan Dialogue software allows attackers to access functionality not properly restricted by access control lists (ACLs). It a...
Apr 29, 2024This vulnerability in Kata Containers allows a container user to modify the Guest micro VM's file system, leading to arbitrary code execution as root ...
Feb 19, 2026This vulnerability allows attackers to decrypt credentials stored in registry keys due to incorrect default permissions in MedDream PACS Premium. Atta...
Jul 28, 2025Ubuntu 20.04 LTS's libvirt package created a control socket with overly permissive world read/write permissions. This allows local attackers to overwr...
Nov 6, 2020This vulnerability allows remote attackers to bypass authentication in Wondershare Repairit without requiring credentials. Attackers can exploit incor...
Sep 17, 2025SIMATIC Virtualization as a Service (SIVaaS) exposes an unauthenticated network share, allowing attackers to access or modify sensitive data without c...
Sep 9, 2025IBM Sterling Secure Proxy versions 6.0.0.0 through 6.2.0.0 contain incorrect permission assignments that could allow unauthorized attackers to retriev...
Jan 19, 2025This vulnerability allows any Android application without permissions to place phone calls without user interaction by sending a crafted intent to the...
Jan 6, 2025This vulnerability in SIMATIC RTLS Locating Manager allows privileged attackers (Administrators group members) to escalate their privileges to the Sys...
May 14, 2024CVE-2023-32724 is a critical memory corruption vulnerability in Zabbix's Ducktape object that allows attackers to directly access and manipulate memor...
Oct 12, 2023A privilege escalation vulnerability in Rockwell Automation FactoryTalk Service Platform allows authenticated users with basic privileges to gain admi...
Feb 16, 2024This vulnerability allows authenticated users to modify Rocket League executable files with full permissions due to insecure access controls. Attacker...
Dec 31, 2025A local privilege escalation vulnerability in Foxit PDF Reader/Editor Update Service allows low-privileged local attackers to modify plugin installati...
Dec 19, 2025This vulnerability in the UISP application allows authenticated users with certain permissions to escalate their privileges to higher levels. It affec...
Aug 21, 2025Insecure permissions in fc-stable-diffusion-plus v1.0.18 allow attackers to escalate privileges and potentially compromise cloud accounts. This affect...
May 22, 2025CVE-2025-45471 is an insecure permissions vulnerability in measure-cold-start v1.4.1 that allows attackers to escalate privileges and potentially comp...
May 22, 2025This vulnerability allows authenticated attackers to escalate privileges and gain root access on affected systems. It affects systems running specific...
Jan 14, 2025This vulnerability in SUNIX Multi I/O Card driver allows attackers with local access to perform arbitrary read/write operations in kernel memory via c...
Jan 7, 2025This vulnerability allows local authenticated attackers to modify sensitive components in Ivanti EPMM due to insecure permissions. Organizations runni...
Oct 8, 2024CVE-2024-7513 is a critical code execution vulnerability in Rockwell Automation products caused by improper default file permissions. Any user can edi...
Aug 14, 2024About CWE-732 (CWE-732)
Our database tracks 310 CVEs classified as CWE-732, with 41 rated critical and 206 rated high severity. The average CVSS score for CWE-732 vulnerabilities is 7.7.
External reference: View CWE-732 on MITRE CWE →
Monitor CWE-732 Vulnerabilities
Get alerted when new CWE-732 CVEs affect your infrastructure.
Start Monitoring Free