6 results (0.001 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

17 Sep 2018 — Prezi Next 1.3.101.11 has a documented purpose of creating HTML5 presentations but has SE_DEBUG_PRIVILEGE on Windows, which might allow attackers to bypass intended access restrictions. Prezi Next 1.3.101.11 tiene el propósito documentado de crear presentaciones HTML5, pero tiene SE_DEBUG_PRIVILEGE en Windows, lo que podría permitir que los atacantes omitan las restricciones de acceso planeadas. • https://github.com/GitHubAssessments/CVE_Assessment_04_2018 •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

22 Oct 1991 — rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

14 May 1991 — The "me" user in NeXT NeXTstep 2.1 and earlier has wheel group privileges, which could allow the me user to use the su command to become root. • http://www.cert.org/advisories/CA-1991-06.html •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

03 Oct 1990 — BuildDisk program on NeXT systems before 2.0 does not prompt users for the root password, which allows local users to gain root privileges. • http://ciac.llnl.gov/ciac/bulletins/b-01.shtml •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

03 Oct 1990 — Vulnerability in NeXT 1.0a and 1.0 with publicly accessible printers allows local users to gain privileges via a combination of the npd program and weak directory permissions. • http://ciac.llnl.gov/ciac/bulletins/b-01.shtml •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

03 Oct 1990 — Vulnerability in restore0.9 installation script in NeXT 1.0a and 1.0 allows local users to gain root privileges. Vulnerabilidad en el script de instalación restore0.9 en NeXT 1.0a y 1.0 permite a usuarios locales conseguir privilegios de root. • http://ciac.llnl.gov/ciac/bulletins/b-01.shtml •