CVE-2024-44812
https://notcve.org/view.php?id=CVE-2024-44812
22 Oct 2024 — SQL Injection vulnerability in Online Complaint Site v.1.0 allows a remote attacker to escalate privileges via the username and password parameters in the /admin.index.php component. • https://github.com/b1u3st0rm/CVE-2024-44812-PoC • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2023-6080 – Privilege Escalation to SYSTEM in Lakeside Software Installer
https://notcve.org/view.php?id=CVE-2023-6080
18 Oct 2024 — Lakeside Software’s SysTrack LsiAgent Installer version 10.7.8 for Windows contains a local privilege escalation vulnerability which allows attackers SYSTEM level access. • https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2024/MNDT-2024-0009.md • CWE-379: Creation of Temporary File in Directory with Insecure Permissions •
CVE-2024-48920 – PutongOJ: unprivileged users can escalate privileges by constructing requests
https://notcve.org/view.php?id=CVE-2024-48920
17 Oct 2024 — Prior to version 2.1.0-beta.1, unprivileged users can escalate privileges by constructing requests. • https://github.com/acm309/PutongOJ/commit/211dfe9ebf1c6618ce5396b0338de4f9b580715e#diff-782628b47d666d5d551e040815ca3f80c0704397258718f0e0f31164608ea7beL118-R120 • CWE-306: Missing Authentication for Critical Function •
CVE-2024-49389
https://notcve.org/view.php?id=CVE-2024-49389
17 Oct 2024 — Local privilege escalation due to insecure folder permissions. • https://security-advisory.acronis.com/advisories/SEC-5319 • CWE-276: Incorrect Default Permissions •
CVE-2024-49390
https://notcve.org/view.php?id=CVE-2024-49390
17 Oct 2024 — Local privilege escalation due to DLL hijacking vulnerability. • https://security-advisory.acronis.com/advisories/SEC-5845 • CWE-427: Uncontrolled Search Path Element •
CVE-2024-49391
https://notcve.org/view.php?id=CVE-2024-49391
17 Oct 2024 — Local privilege escalation due to DLL hijacking vulnerability. • https://security-advisory.acronis.com/advisories/SEC-7220 • CWE-427: Uncontrolled Search Path Element •
CVE-2024-48903 – Trend Micro Deep Security Improper Access Control Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-48903
17 Oct 2024 — An improper access control vulnerability in Trend Micro Deep Security Agent 20 could allow a local attacker to escalate privileges on affected installations. ... This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Deep Security. ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://success.trendmicro.com/en-US/solution/KA-0017997 •
CVE-2024-45710 – SolarWinds Platform Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-45710
16 Oct 2024 — SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. • https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45710 • CWE-427: Uncontrolled Search Path Element •
CVE-2024-21259 – Oracle VirtualBox TPM Heap-based Buffer Overflow Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-21259
15 Oct 2024 — This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. • https://www.oracle.com/security-alerts/cpuoct2024.html • CWE-863: Incorrect Authorization •
CVE-2024-21248 – Oracle VirtualBox Shared Folders Incorrect Authorization Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-21248
15 Oct 2024 — This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. ... An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the current user on the host system. • https://www.oracle.com/security-alerts/cpuoct2024.html •