CVE-2021-24038
https://notcve.org/view.php?id=CVE-2021-24038
Due to a bug with management of handles in OVRServiceLauncher.exe, an attacker could expose a privileged process handle to an unprivileged process, leading to local privilege escalation. This issue affects Oculus Desktop versions after 1.39 and prior to 31.1.0.67.507. Debido a un bug en la administración de los manejadores en el archivo OVRServiceLauncher.exe, un atacante podría exponer un manejador de proceso privilegiado a un proceso no privilegiado, conllevando a una escalada de privilegios local. Este problema afecta a Oculus Desktop versiones posteriores a 1.39 y anteriores a 31.1.0.67.507. • https://www.facebook.com/security/advisories/cve-2021-24038 • CWE-269: Improper Privilege Management •
CVE-2010-3618
https://notcve.org/view.php?id=CVE-2010-3618
PGP Desktop 10.0.x before 10.0.3 SP2 and 10.1.0 before 10.1.0 SP1 does not properly implement the "Decrypt/Verify File via Right-Click" functionality for multi-packet OpenPGP messages that represent multi-message input, which allows remote attackers to spoof signed data by concatenating an additional message to the end of a legitimately signed message, related to a "piggy-back" or "unsigned data injection" issue. PGP Desktop v10.0.x anterior a v10.0.3 SP2 y v10.1.0 anterior a v10.1.0 SP1 no implementa adecuadamente la funcionalidad "Descifrar/Verificar archivo a través de Clic-Derecho" para mensajes OpenPGP multi-empaquetados que representan entradas multi-mensaje, lo que premite a atacantes remotos falsear datos firmados concatenando un mensaje adicional al final del mensaje firmado legitimamente, relacionado con un fallo "piggy-back" o "inyección de datos sin firmar". • http://secunia.com/advisories/42293 http://secunia.com/advisories/42307 http://www.cs.ru.nl/E.Verheul/papers/Govcert/Pretty%20Good%20Piggybagging%20v1.0.pdf http://www.kb.cert.org/vuls/id/300785 http://www.securitytracker.com/id?1024760 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20101118_00 https://exchange.xforce.ibmcloud.com/vulnerabilities/63366 https://pgp.custhelp.com/app/answers/detail/a_id/2290 • CWE-310: Cryptographic Issues •
CVE-2010-3397
https://notcve.org/view.php?id=CVE-2010-3397
Untrusted search path vulnerability in PGP Desktop 9.9.0 Build 397, 9.10.x, 10.0.0 Build 2732, and probably other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tsp.dll or tvttsp.dll that is located in the same folder as a .p12, .pem, .pgp, .prk, .prvkr, .pubkr, .rnd, or .skr file. Vulnerabilidad ruta de búsqueda no confiable en PGP Desktop v9.9.0 Build 397, v9.10.x, v10.0.0 Build 2732, y posiblemente otras versiones permite a usuarios locales, y posiblemente atacantes remotos, ejecutar código a su elección y producir un ataque de secuestro de DLL a través de un troyano tsp.dll o tvttsp.dll que esté localizado en la misma carpeta que un fichero .p12, .pem, .pgp, .prk, .prvkr, .pubkr, .rnd, or .skr. • http://secunia.com/advisories/41135 http://www.securityfocus.com/archive/1/513596/100/0/threaded http://www.securityfocus.com/bid/42856 •