CVE-2024-34013
https://notcve.org/view.php?id=CVE-2024-34013
Local privilege escalation due to OS command injection vulnerability. • https://security-advisory.acronis.com/advisories/SEC-7035 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2024-21164 – Oracle VirtualBox EHCI USB Controller Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2024-21164
An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. • https://www.oracle.com/security-alerts/cpujul2024.html •
CVE-2024-40505
https://notcve.org/view.php?id=CVE-2024-40505
Directory Traversal vulnerability in D-Link DAP-1650 Firmware v.1.03 allows a local attacker to escalate privileges via the hedwig.cgi component. • https://coldwx.github.io/CVE-2024-40505.html https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10266 • CWE-35: Path Traversal: '.../ •
CVE-2024-6689 – Local privilege escalation vulnerability in baramundi Management Agent via MSI Installer
https://notcve.org/view.php?id=CVE-2024-6689
Local Privilege Escalation in MSI-Installer in baramundi Management Agent v23.1.172.0 on Windows allows a local unprivileged user to escalate privileges to SYSTEM. • https://www.baramundi.com/en-us/security-info/s-2024-01 • CWE-749: Exposed Dangerous Method or Function •
CVE-2024-39524 – Junos OS Evolved: CLI parameter processing issue allows privilege escalation
https://notcve.org/view.php?id=CVE-2024-39524
An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level. This issue affects Junos OS Evolved: All versions before 20.4R3-S7-EVO, 21.2-EVO versions before 21.2R3-S8-EVO, 21.4-EVO versions before 21.4R3-S7-EVO, 22.2-EVO versions before 22.2R3-EVO, 22.3-EVO versions before 22.3R2-EVO, 22.4-EVO versions before 22.4R2-EVO. • https://supportportal.juniper.net/JSA82975 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •