Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-284 (访问控制不恰当) — Vulnerability Class 2041

2041 vulnerabilities classified as CWE-284 (访问控制不恰当). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2026-4193 D-Link DIR-823G goahead UpdateClientInfo access control — DIR-823G 7.3 High2026-03-15
CVE-2026-4180 D-Link DIR-816 goahead redirect.asp access control — DIR-816 7.3 High2026-03-15
CVE-2026-32720 Improper Access Control in github.com/ctfer-io/monitoring — monitoring 9.4AICriticalAI2026-03-13
CVE-2026-0977 IBM CICS Transaction Gateway for Multiplatforms Information Disclosure — CICS Transaction Gateway for Multiplatforms 5.1 Medium2026-03-13
CVE-2026-4105 Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method — Red Hat Enterprise Linux 10 6.7 Medium2026-03-13
CVE-2026-32138 NEXULEAN API Key Leak — website 8.2 High2026-03-12
CVE-2026-27591 Winter: Privilege escalation by authenticated backend users — winter 10.0 Critical2026-03-11
CVE-2026-32102 OliveTin Unauthorized Action Output Disclosure via EventStream — OliveTin 8.8AIHighAI2026-03-11
CVE-2026-24509 Dell Alienware Command Center 访问控制错误漏洞 — Alienware Command Center (AWCC) 3.6 Low2026-03-11
CVE-2026-31874 Taskosaur Improper Role Assignment via Parameter Manipulation in User Registration — Taskosaur 9.8 Critical2026-03-11
CVE-2026-31872 Parse Server has a protected fields bypass via dot-notation in query and sort — parse-server 5.3AIMediumAI2026-03-11
CVE-2026-3429 Org.keycloak.services.resources.account: improper access control leading to mfa deletion and account takeover in keycloak account rest api — Red Hat build of Keycloak 26.4 4.2 Medium2026-03-11
CVE-2026-28803 Open Forms possible to view submission details of other people than intended — open-forms 6.5 Medium2026-03-11
CVE-2026-31815 django-unicorn affected by component state manipulation via unvalidated attribute access — django-unicorn 5.3 Medium2026-03-10
CVE-2026-30966 Parse Server role escalation and CLP bypass via direct `_Join` table write — parse-server 10.0 Critical2026-03-10
CVE-2026-30962 Parse Server has a protected fields bypass via logical query operators — parse-server 6.5AIMediumAI2026-03-10
CVE-2026-25176 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.8 High2026-03-10
CVE-2026-24290 Windows Projected File System Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.8 High2026-03-10
CVE-2026-23660 Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability — Windows Admin Center in Azure Portal 7.8 High2026-03-10
CVE-2026-21262 SQL Server Elevation of Privilege Vulnerability — Microsoft SQL Server 2016 Service Pack 3 (GDR) 8.8 High2026-03-10
CVE-2026-22628 Fortinet FortiSwitchAXFixed 访问控制错误漏洞 — FortiSwitchAXFixed 5.1 Medium2026-03-10
CVE-2026-2742 Unauthorized session creation via reserved framework path access — vaadin 9.1AICriticalAI2026-03-10
CVE-2026-30926 SiYuan Note publish service authorization bypass allows low-privilege users to modify notebook content — siyuan 7.1 High2026-03-09
CVE-2025-62166 FreshRSS has an IDOR which allows for viewing feeds of any user and leaking tokens — FreshRSS 7.5 High2026-03-09
CVE-2026-3796 Qi-ANXIN QAX Virus Removal Mini Filter Driver QKSecureIO_Imp.sys ZwTerminateProcess access control — QAX Virus Removal 5.3 Medium2026-03-09
CVE-2026-30859 WeKnora: Broken Access Control - Cross-Tenant Data Exposure — WeKnora 5.3 Medium2026-03-07
CVE-2026-30855 WeKnora: Broken Access Control in Tenant Management — WeKnora 8.8 High2026-03-07
CVE-2026-3668 Freedom Factory dGEN1 org.ethosmobile.webpwaemul AndroidEthereum access control — dGEN1 3.1 Low2026-03-07
CVE-2026-30244 Plane: Unauthenticated Workspace Member Information Disclosure — plane 7.5 High2026-03-06
CVE-2026-29061 Gokapi: Privilege escalation via incomplete API-key permission revocation on user rank demotion — Gokapi 5.4 Medium2026-03-06

Vulnerabilities classified as CWE-284 (访问控制不恰当) represent 2041 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.