Page 4 of 19 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Race condition in Jungo Windriver 12.5.1 allows local users to cause a denial of service (buffer overflow) or gain system privileges by flipping pool buffer size, aka a "double fetch" vulnerability. Condición de carrera en Jungo Windriver 12.5.1 permite que usuarios locales provoquen una denegación de servicio (desbordamiento de búfer) u obtengan privilegios del sistema invirtiendo el tamaño del búfer de grupo. Esto también se conoce como vulnerabilidad "double fetch". Jungo Windriver version 12.5.1 suffers from a privilege escalation vulnerability. • https://www.exploit-db.com/exploits/43494 https://www.fidusinfosec.com/jungo-windriver-code-execution-cve-2018-5189 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

This vulnerability allows local attackers to escalate privileges on Jungo WinDriver 12.4.0 and earlier. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x95382673 by the windrvr1240 kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in a kernel pool overflow. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel. • https://www.exploit-db.com/exploits/42665 http://srcincite.io/advisories/src-2017-0027 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

This vulnerability allows local attackers to escalate privileges on Jungo WinDriver 12.4.0 and earlier. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x953824b7 by the windrvr1240 kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in a kernel pool overflow. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel. • https://www.exploit-db.com/exploits/42624 http://packetstormsecurity.com/files/144046/Jungo-DriverWizard-WinDrive-Overflow.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

This vulnerability allows local attackers to escalate privileges on Jungo WinDriver 12.4.0 and earlier. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x953824a7 by the windrvr1240 kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in an out-of-bounds write condition. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel. • https://www.exploit-db.com/exploits/42625 http://packetstormsecurity.com/files/144045/Jungo-DriverWizard-WinDrive-OOB-Write-Privilege-Escalation.html • CWE-787: Out-of-bounds Write •