Page 2 of 93 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A link following privilege escalation vulnerability in Trend Micro Antivirus for Max 11.0.2150 and below could allow a local attacker to modify a file during the update process and escalate their privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de escalada de privilegios en Trend Micro Antivirus para Max versiones 11.0.2150 y anteriores, podría permitir a un atacante local modificar un archivo durante el proceso de actualización y escalar sus privilegios. Nota: un atacante debe obtener primero la capacidad de ejecutar código con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Antivirus for Mac. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the program_after_update script. • https://helpcenter.trendmicro.com/en-us/article/TMKA-10937 https://www.zerodayinitiative.com/advisories/ZDI-22-371 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Privilege escalation vulnerability in Avast Antivirus prior to 20.4 allows a local user to gain elevated privileges by "hollowing" trusted process which could lead to the bypassing of Avast self-defense. Una vulnerabilidad de escalada de privilegios en Avast Antivirus versiones anteriores a 20.4, permite a un usuario local alcanzar privilegios elevados al "vaciar" los procesos confiables, lo que podría conllevar a una omisión de la autodefensa de Avast • https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST0 https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0 • CWE-863: Incorrect Authorization •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 3

Multiple privilege escalation vulnerabilities in Avast Antivirus prior to 20.4 allow a local user to gain elevated privileges by calling unnecessarily powerful internal methods of the main antivirus service which could lead to the (1) arbitrary file delete, (2) write and (3) reset security. Múltiples vulnerabilidades de escalada de privilegios en Avast Antivirus versiones anteriores a 20.4, permiten a un usuario local alcanzar privilegios elevados al llamar a métodos internos innecesariamente potentes del servicio antivirus principal, lo que podría conllevar el (1) borrado arbitrario de archivos, (2) escritura y (3) restablecimiento de la seguridad • https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.1 https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.2 https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.3 https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0 •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Privilege escalation vulnerability in the Self-Defense driver of Avast Antivirus prior to 20.8 allows a local user with SYSTEM privileges to gain elevated privileges by "hollowing" process wsc_proxy.exe which could lead to acquire antimalware (AM-PPL) protection. Una vulnerabilidad de escalada de privilegios en el controlador de Autodefensa de Avast Antivirus versiones anteriores a 20.8, permite a un usuario local con privilegios SYSTEM alcanzar privilegios elevados al "vaciar" el proceso wsc_proxy.exe, que podría conllevar a una adquisición de protección antimalware (AM-PPL) • https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5 https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0 •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Privilege escalation vulnerability in the Sandbox component of Avast Antivirus prior to 20.4 allows a local sandboxed code to gain elevated privileges by using system IPC interfaces which could lead to exit the sandbox and acquire SYSTEM privileges. Una vulnerabilidad de escalada de privilegios en el componente Sandbox de Avast Antivirus versiones anteriores a 20.4, permite a un código local del sandbox alcanzar privilegios elevados al usar las interfaces IPC del sistema, lo que podría conllevar a una salida del sandbox y la adquisición de privilegios de SYSTEM • https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5 https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0 •