Page 16 of 3525 results (0.069 seconds)

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet. • https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968 • CWE-250: Execution with Unnecessary Privileges CWE-273: Improper Check for Dropped Privileges

CVSS: 9.9EPSS: 0%CPEs: -EXPL: 0

This issue occurs due to the misuse of elevated privileges in the OpenShift Container Platform's build process. ... An attacker running code in a privileged container could escalate their permissions on the node running the container. • https://access.redhat.com/security/cve/CVE-2024-45496 https://bugzilla.redhat.com/show_bug.cgi?id=2308661 https://access.redhat.com/errata/RHSA-2024:6685 https://access.redhat.com/errata/RHSA-2024:6687 https://access.redhat.com/errata/RHSA-2024:6689 https://access.redhat.com/errata/RHSA-2024:6691 https://access.redhat.com/errata/RHSA-2024:6705 • CWE-269: Improper Privilege Management •

CVSS: 9.1EPSS: 0%CPEs: -EXPL: 0

An attacker running code in a privileged container could escalate their permissions on the node running the container. • https://access.redhat.com/security/cve/CVE-2024-7387 https://bugzilla.redhat.com/show_bug.cgi?id=2302259 https://access.redhat.com/errata/RHSA-2024:6685 https://access.redhat.com/errata/RHSA-2024:6687 https://access.redhat.com/errata/RHSA-2024:6689 https://access.redhat.com/errata/RHSA-2024:6691 https://access.redhat.com/errata/RHSA-2024:6705 https://stuxxn.github.io/advisory/2024/10/02/openshift-build-docker-priv-esc.html • CWE-250: Execution with Unnecessary Privileges

CVSS: 6.7EPSS: 0%CPEs: 1EXPL: 0

Local privilege escalation due to DLL hijacking vulnerability. • https://security-advisory.acronis.com/advisories/SEC-7218 • CWE-427: Uncontrolled Search Path Element •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Local privilege escalation due to DLL hijacking vulnerability. • https://security-advisory.acronis.com/advisories/SEC-7188 • CWE-427: Uncontrolled Search Path Element •