Page 204 of 3592 results (0.028 seconds)

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 1

27 Oct 2020 —  La vulnerabilidad podría permitir a atacantes locales ejecutar código con privilegios escalados This vulnerability allows local attackers to escalate privileges on affected installations of Micro Focus Operations Bridge Manager. ... An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. • https://packetstorm.news/files/id/161411 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

27 Oct 2020 — Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware. • https://www.zonealarm.com/software/extreme-security/release-history • CWE-426: Untrusted Search Path •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 4

27 Oct 2020 — A local attacker could possibly use this issue to escalate privileges and run arbitrary code or cause a denial of service. • https://packetstorm.news/files/id/159740 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

26 Oct 2020 — Un atacante debe obtener primero la capacidad de ejecutar código de alto privilegio en el sistema objetivo para explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Antivirus for Mac. ... An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. • https://helpcenter.trendmicro.com/en-us/article/TMKA-09974 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 0

26 Oct 2020 — An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute code in the context of the kernel. • https://helpcenter.trendmicro.com/en-us/article/TMKA-09975 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

23 Oct 2020 — This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system. • https://gist.github.com/harsh-bothra/5be73cfd53f1c5bea307c702ae83ff42 • CWE-269: Improper Privilege Management CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

23 Oct 2020 — NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure. • https://nvidia.custhelp.com/app/answers/detail/a_id/5076 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

23 Oct 2020 — CryptoPro CSP through 5.0.0.10004 on 32-bit platforms allows Local Privilege Escalation (by local users with the SeChangeNotifyPrivilege right) because user-mode input is mishandled during process creation. • https://www.youtube.com/watch?v=b5vPDmMtzwQ •

CVSS: 7.0EPSS: 0%CPEs: 33EXPL: 2

23 Oct 2020 — If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability. • https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921 • CWE-377: Insecure Temporary File CWE-378: Creation of Temporary File With Insecure Permissions CWE-379: Creation of Temporary File in Directory with Insecure Permissions •

CVSS: 8.8EPSS: 80%CPEs: 36EXPL: 2

22 Oct 2020 — La vulnerabilidad podría permitir a los atacantes remotos ejecutar código arbitrario This vulnerability allows remote attackers to escalate privileges on affected installations of Micro Focus Operations Bridge Manager. ... An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. • https://packetstorm.news/files/id/161182 •