CVE-2020-11858 – Code execution with escalated privilegesn vlnerability in Operation bridge Manager and Operations Bridge (containerized) products.
https://notcve.org/view.php?id=CVE-2020-11858
27 Oct 2020 —  La vulnerabilidad podría permitir a atacantes locales ejecutar código con privilegios escalados This vulnerability allows local attackers to escalate privileges on affected installations of Micro Focus Operations Bridge Manager. ... An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. • https://packetstorm.news/files/id/161411 •
CVE-2020-6023
https://notcve.org/view.php?id=CVE-2020-6023
27 Oct 2020 — Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware. • https://www.zonealarm.com/software/extreme-security/release-history • CWE-426: Untrusted Search Path •
CVE-2020-15238 – Local privilege escalation Blueman
https://notcve.org/view.php?id=CVE-2020-15238
27 Oct 2020 — A local attacker could possibly use this issue to escalate privileges and run arbitrary code or cause a denial of service. • https://packetstorm.news/files/id/159740 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •
CVE-2020-27014 – Trend Micro Antivirus for Mac Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2020-27014
26 Oct 2020 — Un atacante debe obtener primero la capacidad de ejecutar código de alto privilegio en el sistema objetivo para explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Antivirus for Mac. ... An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. • https://helpcenter.trendmicro.com/en-us/article/TMKA-09974 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2020-27015 – Trend Micro Antivirus for Mac Error Message Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2020-27015
26 Oct 2020 — An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute code in the context of the kernel. • https://helpcenter.trendmicro.com/en-us/article/TMKA-09975 • CWE-209: Generation of Error Message Containing Sensitive Information •
CVE-2020-24848
https://notcve.org/view.php?id=CVE-2020-24848
23 Oct 2020 — This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system. • https://gist.github.com/harsh-bothra/5be73cfd53f1c5bea307c702ae83ff42 • CWE-269: Improper Privilege Management CWE-287: Improper Authentication •
CVE-2020-5990
https://notcve.org/view.php?id=CVE-2020-5990
23 Oct 2020 — NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure. • https://nvidia.custhelp.com/app/answers/detail/a_id/5076 •
CVE-2020-9331
https://notcve.org/view.php?id=CVE-2020-9331
23 Oct 2020 — CryptoPro CSP through 5.0.0.10004 on 32-bit platforms allows Local Privilege Escalation (by local users with the SeChangeNotifyPrivilege right) because user-mode input is mishandled during process creation. • https://www.youtube.com/watch?v=b5vPDmMtzwQ •
CVE-2020-27216 – jetty: local temporary directory hijacking vulnerability
https://notcve.org/view.php?id=CVE-2020-27216
23 Oct 2020 — If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability. • https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921 • CWE-377: Insecure Temporary File CWE-378: Creation of Temporary File With Insecure Permissions CWE-379: Creation of Temporary File in Directory with Insecure Permissions •
CVE-2020-11853 – Arbitrary code execution vulnerability on multiple Micro Focus products
https://notcve.org/view.php?id=CVE-2020-11853
22 Oct 2020 — La vulnerabilidad podría permitir a los atacantes remotos ejecutar código arbitrario This vulnerability allows remote attackers to escalate privileges on affected installations of Micro Focus Operations Bridge Manager. ... An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. • https://packetstorm.news/files/id/161182 •