Page 4 of 20 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 2

An uninitialised stack variable in the nxfuse component that is part of the Open Source DokanFS library shipped with NoMachine 6.0.66_2 and earlier allows a local low privileged user to gain elevation of privileges on Windows 7 (32 and 64bit), and denial of service for Windows 8 and 10. Una variable de pila no inicializada en el componente nxfuse de la biblioteca Open Source DokanFS incluida en NoMachine, en versiones 6.0.66_2 y anteriores, permite que un usuario local con pocos privilegios eleve sus privilegios en Windows 7 (32 y 64 bits) y que provoque una denegación de servicio (DoS) en Windows 8 y 10. NoMachine versions prior to 6.0.80 (x64) suffer from an nxfuse privilege escalation vulnerability. • https://www.exploit-db.com/exploits/44167 https://www.exploit-db.com/exploits/44168 https://www.fidusinfosec.com/nomachine-road-code-execution-without-fuzzing-cve-2018-6947 https://www.nomachine.com/SU02P00194 https://www.nomachine.com/SU02P00195 https://www.nomachine.com/TR02P08408 • CWE-665: Improper Initialization •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 1

An unspecified server utility in NoMachine before 5.3.10 on Mac OS X and Linux allows authenticated users to gain privileges by gaining access to local files. Una utilidad del servidor sin especificar en NoMachine en versiones anteriores a la 5.3.10 en Mac OS X y Linux permite que usuarios autenticados obtengan privilegios obteniendo acceso a archivos locales. • https://www.exploit-db.com/exploits/42460 https://www.nomachine.com/SU08O00185 https://www.nomachine.com/forums/topic/security-advisory-nomachine-privileges-escalation-vulnerability • CWE-276: Incorrect Default Permissions •

CVSS: 6.8EPSS: 5%CPEs: 18EXPL: 0

nxapplet.jar in No Machine NX Web Companion 3.x and earlier does not properly verify the authenticity of updates, which allows user-assisted remote attackers to execute arbitrary code via a crafted (1) SiteUrl or (2) RedirectUrl parameter that points to a Trojan Horse client.zip update file. nxapplet.jar en No Machine NX Web Companion 3.x y anteriores no verifican de forma adecuada la autenticidad de actualizaciones, o que permite a atacantes remotos asistidos por usuarios locales a ejecutar código mediante (1) SiteUrl manipulado o (2) parámetro RedirectUrl que apunta a un fichero de actualización client.zip troyanizados. • http://archives.neohapsis.com/archives/bugtraq/2012-01/0161.html http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0466.html http://secunia.com/advisories/47685 https://exchange.xforce.ibmcloud.com/vulnerabilities/72712 • CWE-287: Improper Authentication •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Unspecified vulnerability in nxconfigure.sh in NoMachine NX Node 3.x before 3.5.0-4 and NX Server 3.x before 3.5.0-5 allows local users to read arbitrary files via unknown vectors. Vulnerabilidad no especificada en nxconfigure.sh en NoMachine NX Nodo v3.x anterior a v3.5.0-4 y NX Server v3.x anterior a v3.5.0-5 permite a usuarios locales leer ficheros arbitrarios a través de vectores desconocidos. • http://securityreason.com/securityalert/8406 http://www.nomachine.com/tr/view.php?id=TR08I02575 http://www.securityfocus.com/archive/1/519730/100/0/threaded http://www.securityfocus.com/bid/49720 https://exchange.xforce.ibmcloud.com/vulnerabilities/69974 •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

nxconfigure.sh in NoMachine NX Server before 2.1.0-18 does not validate the invoking user, which allows local users to modify server configuration keys in /usr/NX/etc/server.cfg, resulting in an unspecified denial of service. nxconfigure.sh de NoMachine NX Server versiones anteriores a 2.1.0-18 no valida el usuario invocador, lo cual permite a usuarios locales modificar claves de configuración de servidor en /usr/NX/etc/server.cfg, resultando en una denegación de servicio. • http://osvdb.org/33009 http://secunia.com/advisories/23993 http://www.nomachine.com/news_read.php?idnews=190 http://www.nomachine.com/tr/view.php?id=TR01E01622 http://www.securityfocus.com/bid/22308 http://www.vupen.com/english/advisories/2007/0413 https://exchange.xforce.ibmcloud.com/vulnerabilities/31941 •