3 results (0.011 seconds)

CVSS: 8.8EPSS: 0%CPEs: 10EXPL: 0

A potential unauthorized privilege escalation vulnerability has been identified in Micro Focus Data Protector. The vulnerability affects versions 10.10, 10.20, 10.30, 10.40, 10.50, 10.60, 10.70, 10.80, 10.0 and 10.91. A privileged user may potentially misuse this feature and thus allow unintended and unauthorized access of data. Se ha identificado una posible vulnerabilidad de escalada de privilegios no autorizada en Micro Focus Data Protector. La vulnerabilidad afecta las versiones 10.10, 10.20, 10.30, 10.40, 10.50, 10.60, 10.70, 10.80, 10.0 y 10.91. • https://portal.microfocus.com/s/article/KM000001460 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

Privileges manipulation in Micro Focus Data Protector, versions 10.00, 10.01, 10.02, 10.03, 10.04, 10.10, 10.20, 10.30, 10.40. This vulnerability could be exploited by a low-privileged user to execute a custom binary with higher privileges. Una manipulación de privilegios en Micro Focus Data Protector, versiones 10.00, 10.01, 10.02, 10.03, 10.04, 10.10, 10.20, 10.30, 10.40. Esta vulnerabilidad podría ser explotada por parte de un usuario poco privilegiado para ejecutar un binario personalizado con mayores privilegios. • https://www.exploit-db.com/exploits/47580 http://packetstormsecurity.com/files/155076/Micro-Focus-HPE-Data-Protector-SUID-Privilege-Escalation.html https://softwaresupport.softwaregrp.com/doc/KM03525630 • CWE-426: Untrusted Search Path •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

Remote arbitrary code execution in Micro Focus Data Protector, version 10.03 this vulnerability could allow remote arbitrary code execution. Ejecución remota de código arbitrario en Micro Focus Data Protector, versión 10.03; esta vulnerabilidad podría permitir una ejecución remota de código arbitrario. • https://softwaresupport.softwaregrp.com/doc/KM03337614 •