Page 51 of 3532 results (0.063 seconds)

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

Windows Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Windows Win32k This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066 • CWE-416: Use After Free •

CVSS: 9.6EPSS: 0%CPEs: -EXPL: 0

This could allow an authenticated attacker with the 'Manage firmware updates' role to escalate their privileges on the underlying OS level. • https://cert-portal.siemens.com/productcert/html/ssa-381581.html • CWE-378: Creation of Temporary File With Insecure Permissions •

CVSS: 7.1EPSS: 0%CPEs: -EXPL: 0

A local authenticated user with this privilege could use this modify users outside of their own scope as well as to escalate privileges. • https://cert-portal.siemens.com/productcert/html/ssa-381581.html • CWE-602: Client-Side Enforcement of Server-Side Security •

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

Due to missing authorization checks, SAP Enable Now allows an author to escalate privileges to access information which should otherwise be restricted. • https://me.sap.com/notes/3476348 https://url.sap/sapsecuritypatchday • CWE-862: Missing Authorization •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A local privilege escalation vlnerability in the WatchGuard Mobile VPN with SSL client on Windows enables a local user to execute arbitrary commands with elevated privileged. • https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00010 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •