CVE-2024-34017
https://notcve.org/view.php?id=CVE-2024-34017
Local privilege escalation due to DLL hijacking vulnerability. • https://security-advisory.acronis.com/advisories/SEC-4505 • CWE-427: Uncontrolled Search Path Element •
CVE-2024-34019
https://notcve.org/view.php?id=CVE-2024-34019
Local privilege escalation due to DLL hijacking vulnerability. • https://security-advisory.acronis.com/advisories/SEC-3079 • CWE-427: Uncontrolled Search Path Element •
CVE-2024-6672 – WhatsUp Gold getMonitorJoin SQL Injection Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-6672
In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an authenticated low-privileged attacker to achieve privilege escalation by modifying a privileged user's password. This vulnerability allows remote attackers to escalate privileges on affected installations of Progress Software WhatsUp Gold. ... An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. • https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024 https://www.progress.com/network-monitoring • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-40671 – PowerVR DevmemIntChangeSparse2() Use-After-Free
https://notcve.org/view.php?id=CVE-2024-40671
This could lead to local escalation of privilege with no additional execution privileges needed. • https://source.android.com/security/bulletin/2024-11-01 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2022-39997
https://notcve.org/view.php?id=CVE-2022-39997
A weak password requirement issue was discovered in Teldats Router RS123, RS123w allows a remote attacker to escalate privileges • https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat%27s%20Router%20Vulnerability.md • CWE-521: Weak Password Requirements •