Page 227 of 2983 results (0.033 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. • http://pypi.doubanio.com/simple/request https://github.com/josubg/django_navbar_client/issues/1 https://pypi.org/project/django-navbar-client •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A local privilege escalation vulnerability was identified within the "luminati_net_updater_win_eagleget_com" service in EagleGet Downloader version 2.1.5.20 Stable. • http://eagleget.com https://medium.com/%40n1pwn/local-privilege-escalation-in-eagleget-1fde79fe47c0 • CWE-269: Improper Privilege Management •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01 • CWE-424: Improper Protection of Alternate Path •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01 • CWE-250: Execution with Unnecessary Privileges •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Comodo Antivirus 12.2.2.8012 has a quarantine flaw that allows privilege escalation. To escalate privilege, a low-privileged attacker can use an NTFS directory junction to restore a malicious DLL from quarantine into the System32 folder. Comodo Antivirus versión 12.2.2.8012, presenta un fallo de cuarentena que permite una escalada de privilegios. Para escalar privilegios, un atacante con pocos privilegios puede usar una unión de directorios NTFS para restaurar una DLL maliciosa de la cuarentena a la carpeta System32 • https://antivirus.comodo.com https://r0h1rr1m.medium.com/comodo-antivirus-local-privilege-escalation-through-insecure-file-move-476a4601d9b8 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •