Page 165 of 3512 results (0.159 seconds)

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

Local privilege escalation due to unrestricted loading of unsigned libraries. • https://security-advisory.acronis.com/advisories/SEC-4728 • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 8.8EPSS: 0%CPEs: 13EXPL: 0

Local privilege escalation due to insecure driver communication port permissions. • https://security-advisory.acronis.com/SEC-4858 https://security-advisory.acronis.com/advisories/SEC-5487 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Local privilege escalation during recovery due to improper soft link handling. • https://security-advisory.acronis.com/advisories/SEC-2499 • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •

CVSS: 8.8EPSS: 0%CPEs: 8EXPL: 1

Local privilege escalation due to insecure driver communication port permissions. • https://github.com/alfarom256/CVE-2022-45451 https://security-advisory.acronis.com/SEC-5487 https://security-advisory.acronis.com/advisories/SEC-4858 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

A use-after-free flaw was found in the Linux kernel's netfilter: nf_tables component, which can be exploited to achieve local privilege escalation. • http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8 https://kernel.dance/6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8 https://www.debian.org/security/2023/dsa-5492 https://access.redhat.com/security/cve/CVE-2023-3777 https://bugzilla.redhat.com/show_bug.cgi?id=223 • CWE-416: Use After Free •