Page 133 of 3512 results (0.023 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

The 'sid' parameter in the group_status.asp resource allows an attacker to escalate privileges and obtain sensitive information. • https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48929 • CWE-384: Session Fixation •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

DLL hijacking vulnerability in TTplayer version 7.0.2, allows local attackers to escalate privileges and execute arbitrary code via urlmon.dll. • https://github.com/xieqiang11/POC4/blob/main/README.md • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered in Huddly HuddlyCameraService before version 8.0.7, not including version 7.99, allows attackers to manipulate files and escalate privileges via RollingFileAppender.DeleteFile method performed by the log4net library. • https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

DLL Hijacking vulnerability in Huddly HuddlyCameraService before version 8.0.7, not including version 7.99, due to the installation of the service in a directory that grants write privileges to standard users, allows attackers to manipulate files, execute arbitrary code, and escalate privileges. • https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 22EXPL: 0

This issue could allow a local user to crash the system or escalate their privileges on the system. • https://access.redhat.com/security/cve/CVE-2023-5972 https://bugzilla.redhat.com/show_bug.cgi?id=2248189 https://github.com/torvalds/linux/commit/505ce0630ad5d31185695f8a29dde8d29f28faa7 https://github.com/torvalds/linux/commit/52177bbf19e6e9398375a148d2e13ed492b40b80 • CWE-476: NULL Pointer Dereference •