Page 198 of 3592 results (0.031 seconds)

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

08 Jan 2021 — A local attacker could use this to cause a denial of service or escalate privileges. • https://nvidia.custhelp.com/app/answers/detail/a_id/5142 •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 0

08 Jan 2021 — A local attacker could use this to cause a denial of service or escalate privileges. • https://nvidia.custhelp.com/app/answers/detail/a_id/5142 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 5EXPL: 1

08 Jan 2021 — A local attacker could use this to cause a denial of service or escalate privileges. • https://github.com/pokerfaceSad/CVE-2021-1056 • CWE-276: Incorrect Default Permissions •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

05 Jan 2021 — An exploitable local privilege elevation vulnerability exists in the file system permissions of the Mobile-911 Server V2.5 install directory. Depending on the vector chosen, an attacker can overwrite the service executable and execute arbitrary code with System privileges or replace other files within the installation folder that could lead to local privilege escalation. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1151 • CWE-276: Incorrect Default Permissions •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

05 Jan 2021 — An exploitable local privilege elevation vulnerability exists in the file system permissions of the Win-911 Enterprise V4.20.13 install directory via WIN-911 Account Change Utility. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1150 • CWE-276: Incorrect Default Permissions •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 2

05 Jan 2021 — An exploitable local privilege elevation vulnerability exists in the file system permissions of the Win-911 Enterprise V4.20.13 install directory via “WIN-911 Mobile Runtime” service. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1150 • CWE-276: Incorrect Default Permissions •

CVSS: 8.8EPSS: 3%CPEs: 3EXPL: 0

04 Jan 2021 —  La mayor amenaza de esta vulnerabilidad es la integridad de los datos, la confidencialidad y la disponibilidad del sistema This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. ... An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. • https://bugzilla.redhat.com/show_bug.cgi?id=1873476 • CWE-416: Use After Free •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 2

26 Dec 2020 — Beijing Huorong Internet Security 5.0.55.2 allows a non-admin user to escalate privileges by injecting code into a process, and then waiting for a Huorong services restart or a system reboot. • https://github.com/yangfan6888/PoC •

CVSS: 9.0EPSS: 0%CPEs: 12EXPL: 0

17 Dec 2020 — On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation). • https://cert.vde.com/en-us/advisories/vde-2020-049 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.3EPSS: 0%CPEs: 18EXPL: 0

16 Dec 2020 — This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. ... An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. • https://support.apple.com/en-us/HT212011 • CWE-787: Out-of-bounds Write •