5246 results (0.043 seconds)

CVSS: 9.3EPSS: %CPEs: 1EXPL: 0

02 Feb 2026 — It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler function uses _xpc_connection_get_pid(arg2) as argument for the hasValidSignature function. This value can not be trusted since it is vulnerable to PID reuse attacks. • https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-native-instruments-native-access-macos • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 8.8EPSS: %CPEs: 1EXPL: 0

02 Feb 2026 — During the installation of the Native Access application, a privileged helper `com.native-instruments.NativeAccess.Helper2`, which is used by Native Access to trigger functions via XPC communication like copy-file, remove or set-permissions, is deployed as well. The communication with the XPC service of the privileged helper is only allowed if the client process is signed with the corresponding certificate and fulfills the following code signing requirement: "anchor trusted and certificate leaf[subject.CN] ... • https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-native-instruments-native-access-macos • CWE-426: Untrusted Search Path •

CVSS: 9.6EPSS: 0%CPEs: -EXPL: 0

02 Feb 2026 — The issue results from an excessive attack surface, allowing lower-privileged users to escalate their privileges and take over accounts. • https://github.com/lunary-ai/lunary/commit/fc7ab3d5621c18992da5dab3a2a9a8d227d42311 • CWE-1125: Excessive Attack Surface •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 0

30 Jan 2026 — IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 could allow an instance owner to execute malicious code that escalate their privileges to root due to execution of unnecessary privileges operated at a higher than minimum level. IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 could allow an instance owner to execute malicious code that escalate their privileges to root due to execution of unnecessary priv... • https://www.ibm.com/support/pages/node/7257519 • CWE-250: Execution with Unnecessary Privileges

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

30 Jan 2026 — IBM Db2 for Windows 12.1.0 - 12.1.3 could allow a local user with filesystem access to escalate their privileges due to the use of an unquoted search path element. IBM Db2 for Windows 12.1.0 - 12.1.3 could allow a local user with filesystem access to escalate their privileges due to the use of an unquoted search path element. • https://www.ibm.com/support/pages/node/7257678 • CWE-428: Unquoted Search Path or Element •

CVSS: 6.7EPSS: 0%CPEs: 2EXPL: 0

30 Jan 2026 — When the victim runs PsySH with elevated privileges (e.g., root), this results in local privilege escalation. ... If a privileged user (e.g., root, a CI runner, or an ops/debug account) launches PsySH with CWD set to an attacker-writable directory containing a malicious `.psysh.php`, the attacker can execute commands with that privileged user’s permissions, resulting in local privilege escalation. ... If a privileged user runs Tinker while their shell is in an attacker-wri... • https://github.com/bobthecow/psysh/releases/tag/v0.11.23 • CWE-427: Uncontrolled Search Path Element •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 1

30 Jan 2026 — Atomic Alarm Clock 6.3 contains a local privilege escalation vulnerability in its service configuration that allows attackers to execute arbitrary code with SYSTEM privileges. • http://www.drive-software.com • CWE-428: Unquoted Search Path or Element •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

30 Jan 2026 — Planting a custom configuration file in ESET Inspect Connector allow load a malicious DLL. Planting a custom configuration file in ESET Inspect Connector allow load a malicious DLL. • https://support.eset.com/en/ca8910-eset-customer-advisory-local-privilege-escalation-vulnerability-fixed-in-eset-inspect-connector-for-windows • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

30 Jan 2026 — Improper access control in the WCF endpoint in Edgemo (now owned by Danoffice IT) Local Admin Service 1.2.7.23180 on Windows allows a local user to escalate their privileges to local administrator via direct communication with the LocalAdminService.exe named pipe, bypassing client-side group membership restrictions. • https://retest.dk/local-privilege-escalation-vulnerability-found-in-local-admin-service • CWE-250: Execution with Unnecessary Privileges

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 1

29 Jan 2026 — 10-Strike Bandwidth Monitor 3.9 contains an unquoted service path vulnerability in multiple services that allows local attackers to escalate privileges. • https://www.10-strike.com • CWE-428: Unquoted Search Path or Element •