Page 66 of 5754 results (0.206 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

06 Jun 2024 — A link following vulnerability in Trend Micro Deep Security 20.x agents below build 20.0.1-3180 could allow a local attacker to escalate privileges on affected installations. ... Un enlace que sigue a una vulnerabilidad en los agentes Trend Micro Deep Security 20.x por debajo de la compilación 20.0.1-3180 podría permitir a un atacante local escalar privilegios en las instalaciones afectadas. ... This vulnerability allows local attackers to escalate privile... • https://success.trendmicro.com/dcx/s/solution/000298151 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

06 Jun 2024 — A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 could allow an attacker to escalate privileges on affected installations. ... This vulnerability allows remote attackers to escalate privileges on affected installations of Trend Micro InterScan Web Security Virtual Appliance. ... An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the... • https://success.trendmicro.com/dcx/s/solution/000298065 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

06 Jun 2024 — Trend Micro Security 17.x (Consumer) is vulnerable to a Privilege Escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own. Trend Micro Security 17.x (Consumidor) es afectado por una vulnerabilidad de escalada de privilegios que podría permitir a un atacante local eliminar involuntariamente archivos privilegiados de Trend Micro, incluido el suyo propio. This vulnerability allows local attackers to <... • https://helpcenter.trendmicro.com/en-us/article/tmka-19175 • CWE-269: Improper Privilege Management •

CVSS: 6.7EPSS: 0%CPEs: 1EXPL: 1

04 Jun 2024 — This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. ... Esto podría conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecución adicionales. • https://packetstorm.news/files/id/178928 • CWE-269: Improper Privilege Management •

CVSS: 6.7EPSS: 0%CPEs: 11EXPL: 0

03 Jun 2024 — This could lead to local escalation of privilege with System execution privileges needed. ... Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. • https://corp.mediatek.com/product-security-bulletin/June-2024 • CWE-787: Out-of-bounds Write •

CVSS: 6.6EPSS: 0%CPEs: 30EXPL: 0

03 Jun 2024 — This could lead to local escalation of privilege with System execution privileges needed. ... Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. • https://corp.mediatek.com/product-security-bulletin/June-2024 • CWE-787: Out-of-bounds Write •

CVSS: 6.6EPSS: 0%CPEs: 4EXPL: 0

03 Jun 2024 — This could lead to local escalation of privilege with System execution privileges needed. ... Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. • https://corp.mediatek.com/product-security-bulletin/June-2024 • CWE-787: Out-of-bounds Write •

CVSS: 6.6EPSS: 0%CPEs: 5EXPL: 0

03 Jun 2024 — This could lead to local escalation of privilege with System execution privileges needed. ... Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. • https://corp.mediatek.com/product-security-bulletin/June-2024 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

31 May 2024 — A local privilege escalation vulnerability in Ivanti Secure Access Client for Windows allows a low privileged user to execute code as SYSTEM. Una vulnerabilidad de escalada de privilegios local en Ivanti Secure Access Client para Windows permite a un usuario con pocos privilegios ejecutar código como SYSTEM. • https://forums.ivanti.com/s/article/Security-Advisory-May-2024?language=en_US • CWE-250: Execution with Unnecessary Privileges •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

31 May 2024 — A local privilege escalation vulnerability in Ivanti Secure Access Client for Linux before 22.7R1, allows a low privileged user to execute code as root. Una vulnerabilidad de escalada de privilegios local en Ivanti Secure Access Client para Linux anterior a 22.7R1 permite a un usuario con pocos privilegios ejecutar código como root. • https://forums.ivanti.com/s/article/Security-Advisory-May-2024 •