Page 3 of 4825 results (0.008 seconds)

CVSS: 7.0EPSS: 0%CPEs: 5EXPL: 4

17 Jun 2025 — A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. ... Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. ... This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system. ... A local attacker with an active session on the console can use thi... • https://github.com/guinea-offensive-security/CVE-2025-6019 • CWE-250: Execution with Unnecessary Privileges

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

16 Jun 2025 — In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could execute code with SYSTEM privilege. • https://www.tenable.com/security/tns-2025-11 • CWE-276: Incorrect Default Permissions •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

13 Jun 2025 — In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege. • https://www.tenable.com/security/tns-2025-11 • CWE-269: Improper Privilege Management •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

13 Jun 2025 — In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could arbitrarily delete local system files with SYSTEM privilege, potentially leading to local privilege escalation. • https://www.tenable.com/security/tns-2025-11 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

13 Jun 2025 — Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own. This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Maximum Security. ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://helpcenter.trendmicro.com/en-us/article/TMKA-18461 • CWE-64: Windows Shortcut Following (.LNK) •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

12 Jun 2025 — An incorrect privilege assignment vulnerability in Palo Alto Networks Cortex® XDR Broker VM allows an authenticated administrative user to execute certain files available within the Broker VM and escalate their privileges to root. • https://security.paloaltonetworks.com/CVE-2025-4228 • CWE-266: Incorrect Privilege Assignment •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

12 Jun 2025 — An improper neutralization of wildcards vulnerability in the log collection feature of Palo Alto Networks GlobalProtect™ app on macOS allows a non administrative user to escalate their privileges to root. • https://security.paloaltonetworks.com/CVE-2025-4232 • CWE-155: Improper Neutralization of Wildcards or Matching Symbols •

CVSS: 8.4EPSS: 0%CPEs: -EXPL: 0

12 Jun 2025 — In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could arbitrarily delete local system files with SYSTEM privilege, potentially leading to local privilege escalation. - CVE-2025-36633 Tenable has released Agent 10.8.5 to address these issues. •

CVSS: 8.4EPSS: 0%CPEs: -EXPL: 0

12 Jun 2025 — In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could arbitrarily delete local system files with SYSTEM privilege, potentially leading to local privilege escalation. - CVE-2025-36633 Tenable has released Agent 10.8.5 to address these issues. •

CVSS: 8.4EPSS: 0%CPEs: -EXPL: 0

12 Jun 2025 — In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could arbitrarily delete local system files with SYSTEM privilege, potentially leading to local privilege escalation. - CVE-2025-36633 Tenable has released Agent 10.8.5 to address these issues. •