Page 185 of 2983 results (0.021 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

EXEMSI MSI Wrapper Versions prior to 10.0.50 and at least since version 6.0.91 will introduce a local privilege escalation vulnerability in installers it creates. • http://exemsi.com http://msi.com https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-ninjarmm •

CVSS: 6.1EPSS: 0%CPEs: 8EXPL: 1

This vulnerability allows attackers to escalate privileges via unspecified vectors. • https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38628/CVE-2022-38628.txt • CWE-384: Session Fixation •

CVSS: 8.8EPSS: 0%CPEs: 266EXPL: 0

This vulnerability allows local attackers to escalate privileges on affected installations of VMware ESXi. ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of kernel. • https://www.vmware.com/security/advisories/VMSA-2022-0030.html • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 5EXPL: 0

The token can be used to escalate privileges within the Digital Rebar system and grant full administrative access. • https://docs.rackn.io/en/latest/doc/security/cve_2022_46383.html https://rackn.com/products/rebar •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 3

An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file. • https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE https://github.com/yuriisanin/CVE-2022-45771 https://github.com/pwndoc/pwndoc https://github.com/pwndoc/pwndoc/issues/401 •