3 results (0.008 seconds)

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

In ControlUp Real-Time Agent before 8.6, an unquoted path can result in privilege escalation. An attacker would require write permissions to the root level of the OS drive (C:\) to exploit this. En ControlUp Real-Time Agent versiones anteriores a 8.6, una ruta no citada puede resultar en una escalada de privilegios. Un atacante necesitaría permisos de escritura en nivel root de la unidad del sistema operativo (C:\) para explotar esto • https://www.controlup.com/security/cve-2022-27905 • CWE-428: Unquoted Search Path or Element •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

An unauthenticated Named Pipe channel in Controlup Real-Time Agent (cuAgent.exe) before 8.5 potentially allows an attacker to run OS commands via the ProcessActionRequest WCF method. Un canal Named Pipe no autenticado en el agente en tiempo real de Controlup (cuAgent.exe) versiones anteriores a 8.5, permite potencialmente a un atacante ejecutar comandos del Sistema Operativo por medio del método ProcessActionRequest WCF • https://controlup.com https://www.controlup.com/security/security-advisory-local-privilege-escalation • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

A hardcoded key in ControlUp Real-Time Agent (cuAgent.exe) before 8.2.5 may allow a potential attacker to run OS commands via a WCF channel. Una clave embebida en el agente en tiempo real de ControlUp (cuAgent.exe) versiones anteriores a 8.2.5, puede permitir a un atacante potencial ejecutar comandos del sistema operativo por medio de un canal WCF • https://controlup.com https://www.controlup.com/security/security-advisory-hardcoded-key • CWE-798: Use of Hard-coded Credentials •