Microsoft Exchange Server 2000 System Attendant gives "Everyone" group privileges to the WinReg key, which could allow remote attackers to read or modify registry keys.
Max CVSS
6.4
EPSS Score
0.66%
Published
2002-03-08
Updated
2020-04-02
rsync, when running in daemon mode, does not properly call setgroups before dropping privileges, which could provide supplemental group privileges to local users, who could then read certain files that would otherwise be disallowed.
Max CVSS
2.1
EPSS Score
0.06%
Published
2002-03-15
Updated
2020-11-16
A vulnerability was found in ISS BlackICE PC Protection and classified as critical. Affected by this issue is the component Cross Site Scripting Detection. The manipulation as part of POST/PUT/DELETE/OPTIONS Request leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Max CVSS
9.8
EPSS Score
0.19%
Published
2022-03-28
Updated
2024-04-11
gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files.
Max CVSS
2.1
EPSS Score
0.09%
Published
2004-10-04
Updated
2023-03-24
linux vserver 2.6 before 2.6.17 suffers from privilege escalation in remount code.
Max CVSS
10.0
EPSS Score
0.22%
Published
2019-11-06
Updated
2019-11-06
Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d through 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user.
Max CVSS
7.2
EPSS Score
52.86%
Published
2007-05-14
Updated
2022-08-29
The Site Documentation Drupal module 5.x before 5.x-1.8 and 6.x before 6.x-1.1 allows remote authenticated users to gain privileges of other users by leveraging the "access content" permission to list tables and obtain session IDs from the database.
Max CVSS
5.0
EPSS Score
0.34%
Published
2008-05-16
Updated
2021-04-19
The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint.
Max CVSS
7.8
EPSS Score
0.04%
Published
2008-07-09
Updated
2023-02-13
The ThreadPool class in Windows Vista Gold and SP1, and Server 2008, does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by leveraging incorrect thread ACLs to access the resources of one of the processes, aka "Windows Thread Pool ACL Weakness Vulnerability."
Max CVSS
6.9
EPSS Score
0.05%
Published
2009-04-15
Updated
2021-11-08
The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
Max CVSS
5.9
EPSS Score
0.05%
Published
2009-08-18
Updated
2020-08-28
The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
Max CVSS
7.2
EPSS Score
0.04%
Published
2010-09-22
Updated
2023-02-13
The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
Max CVSS
6.2
EPSS Score
0.04%
Published
2010-12-30
Updated
2023-02-13
The ACPI subsystem in the Linux kernel before 2.6.36.2 uses 0222 permissions for the debugfs custom_method file, which allows local users to gain privileges by placing a custom ACPI method in the ACPI interpreter tables, related to the acpi_debugfs_init function in drivers/acpi/debugfs.c.
Max CVSS
6.9
EPSS Score
0.04%
Published
2010-12-22
Updated
2023-02-13
In ConsoleKit before 0.4.2, an intended security policy restriction bypass was found. This flaw allows an authenticated system user to escalate their privileges by initiating a remote VNC session.
Max CVSS
8.8
EPSS Score
0.26%
Published
2019-11-13
Updated
2019-11-18
ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.
Max CVSS
6.5
EPSS Score
0.35%
Published
2011-07-11
Updated
2021-02-02
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
Max CVSS
7.2
EPSS Score
0.04%
Published
2019-11-15
Updated
2019-11-26
The WebUI privilege implementation in Google Chrome before 17.0.963.83 does not properly perform isolation, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
Max CVSS
4.3
EPSS Score
0.34%
Published
2012-03-22
Updated
2020-04-14
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
Max CVSS
7.8
EPSS Score
0.04%
Published
2019-11-19
Updated
2019-12-03
Google Chrome before 15.0.874.120, when Java Runtime Environment (JRE) 7 is used, does not request user confirmation before applet execution begins, which allows remote attackers to have an unspecified impact via a crafted applet.
Max CVSS
7.5
EPSS Score
0.94%
Published
2011-11-11
Updated
2020-05-08
cobbler has local privilege escalation via the use of insecure location for PYTHON_EGG_CACHE
Max CVSS
7.8
EPSS Score
0.04%
Published
2019-11-19
Updated
2019-11-21
Cisco IOS 12.2 through 12.4 and 15.0 through 15.2 and IOS XE 2.1.x through 2.6.x and 3.1.xS before 3.1.2S, 3.2.xS through 3.4.xS before 3.4.2S, 3.5.xS before 3.5.1S, and 3.1.xSG and 3.2.xSG before 3.2.2SG, when AAA authorization is enabled, allow remote authenticated users to bypass intended access restrictions and execute commands via a (1) HTTP or (2) HTTPS session, aka Bug ID CSCtr91106.
Max CVSS
8.5
EPSS Score
0.38%
Published
2012-03-29
Updated
2019-09-27
A Security Bypass vulnerability exists in the phpCAS 1.2.2 library from the jasig project due to the way proxying of services are managed.
Max CVSS
5.3
EPSS Score
1.75%
Published
2019-12-05
Updated
2019-12-30
Joomla! before 2.5.3 allows Admin Account Creation.
Max CVSS
7.5
EPSS Score
2.96%
Published
2020-01-15
Updated
2020-01-22
A Privilege Escalation vulnerability exits in Fedoraproject Sectool due to an incorrect DBus file.
Max CVSS
7.8
EPSS Score
0.05%
Published
2019-12-06
Updated
2019-12-16
An issue exists in the property replacements feature in any descriptor in JBoxx AS 7.1.1 ignores java security policies
Max CVSS
3.3
EPSS Score
0.05%
Published
2019-12-06
Updated
2019-12-16
1951 vulnerabilities found
1 2 3 4 5 6 ...... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!