5 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 4

Silicon Integrated Systems XGI WindowsXP Display Manager (aka XGI VGA Driver Manager and VGA Display Manager) 6.14.10.1090 allows local users to gain privileges via a crafted 0x96002404 IOCTL call. Silicon Integrated Systems XGI WindowsXP Display Manager (también se conoce como XGI VGA Driver Manager y VGA Display Manager) versión 6.14.10.1090, permite a usuarios locales alcanzar privilegios por medio de una llamada IOCTL 0x96002404 diseñada. • https://www.exploit-db.com/exploits/38055 http://packetstormsecurity.com/files/133400/XGI-Windows-VGA-Display-Manager-Privilege-Escalation.html http://seclists.org/fulldisclosure/2015/Sep/2 http://www.securityfocus.com/archive/1/archive/1/536373/100/0/threaded https://www.korelogic.com/Resources/Advisories/KL-001-2015-004.txt • CWE-269: Improper Privilege Management •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 4

Silicon Integrated Systems WindowsXP Display Manager (aka VGA Driver Manager and VGA Display Manager) 6.14.10.3930 allows local users to gain privileges via a crafted (1) 0x96002400 or (2) 0x96002404 IOCTL call. Vulnerabilidad en Silicon Integrated Systems WindowsXP Display Manager (también conocido como VGA Driver Manager y VGA Display Manager) 6.14.10.3930, permite a usuarios locales obtener privilegios a través de una llamada IOCTL (1) 0x96002400 o (2) 0x96002404 manipulada. • https://www.exploit-db.com/exploits/38054 http://packetstormsecurity.com/files/133399/SiS-Windows-VGA-Display-Manager-Privilege-Escalation.html http://seclists.org/fulldisclosure/2015/Sep/1 http://www.securityfocus.com/archive/1/536370/100/0/threaded https://www.korelogic.com/Resources/Advisories/KL-001-2015-003.txt •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

PHP remote file inclusion vulnerability in modules/Discipline/StudentFieldBreakdown.php in Focus/SIS 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the FocusPath parameter, a different vector than CVE-2007-4806. NOTE: the provenance of this information is unknown. Una vulnerabilidad de inclusión remota de archivos PHP en el archivo modules/Discipline/StudentFieldBreakdown.php en Focus/SIS versión 1.0, permite a atacantes remotos ejecutar código PHP arbitrario por medio de una URL en el parámetro FocusPath un vector de ataque diferente de CVE-2007-4806. NOTA: la procedencia de esta información es desconocida. • https://www.exploit-db.com/exploits/4377 http://secunia.com/advisories/26750 http://www.attrition.org/pipermail/vim/2007-September/001788.html http://www.osvdb.org/36953 http://www.vupen.com/english/advisories/2007/3134 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 2

PHP remote file inclusion vulnerability in modules/Discipline/CategoryBreakdownTime.php in Focus/SIS 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the FocusPath parameter. Vulnerabilidad de inclusión remota de archivo en PHP en modules/Discipline/CategoryBreakdownTime.php de Focus/SIS 1.0 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro FocusPath. • https://www.exploit-db.com/exploits/4377 http://secunia.com/advisories/26750 http://www.attrition.org/pipermail/vim/2007-September/001788.html http://www.osvdb.org/36952 http://www.securityfocus.com/bid/25603 http://www.vupen.com/english/advisories/2007/3134 https://exchange.xforce.ibmcloud.com/vulnerabilities/36521 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 2

Multiple PHP remote file inclusion vulnerabilities in Focus/SIS 2.2 allow remote attackers to execute arbitrary PHP code via a URL in the staticpath parameter to (1) modules/Discipline/CategoryBreakdownTime.php or (2) modules/Discipline/StudentFieldBreakdown.php. Múltiples vulnerabilidades de inclusión remota de archivo en PHP en Focux/SIS 2.2 permiten a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro staticpath de (1) modules/Discipline/CategoryBreakdownTime.php o (2) modules/Discipline/StudentFieldBreakdown.php. • https://www.exploit-db.com/exploits/4377 http://secunia.com/advisories/26775 http://www.osvdb.org/36997 http://www.osvdb.org/36998 http://www.securityfocus.com/bid/25603 http://www.vupen.com/english/advisories/2007/3133 https://exchange.xforce.ibmcloud.com/vulnerabilities/36523 • CWE-94: Improper Control of Generation of Code ('Code Injection') •