Search Results (1891 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-41718 2 Ivanti, Microsoft 2 Secure Access Client, Windows 2025-01-07 7.8 High
When a particular process flow is initiated, an attacker may be able to gain unauthorized elevated privileges on the affected system when having control over a specific file.
CVE-2023-35080 2 Ivanti, Microsoft 2 Secure Access Client, Windows 2025-01-07 7.8 High
A vulnerability has been identified in the Ivanti Secure Access Windows client, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to various security risks, including the escalation of privileges, denial of service, or information disclosure.
CVE-2023-33282 1 Marvalglobal 1 Msm 2025-01-07 9.1 Critical
Marval MSM through 14.19.0.12476 and 15.0 has a System account with default credentials. A remote attacker is able to login and create a valid session. This makes it possible to make backend calls to endpoints in the application.
CVE-2023-31116 1 Samsung 4 Exynos 5123, Exynos 5123 Firmware, Exynos 5300 and 1 more 2025-01-07 9.8 Critical
An issue was discovered in the Shannon RCS component in Samsung Exynos Modem 5123 and 5300. An incorrect default permission can cause unintended querying of RCS capability via a crafted application.
CVE-2023-28739 1 Intel 1 Chipset Device Software 2025-01-07 6.7 Medium
Incorrect default permissions in some Intel(R) Chipset Driver Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-32221 1 Easeus 1 Todo Backup 2025-01-04 8.8 High
EaseUS Todo Backup version 20220111.390 - An omission during installation may allow a local attacker to perform privilege escalation.
CVE-2024-38222 1 Microsoft 2 Edge, Edge Chromium 2024-12-31 6.5 Medium
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CVE-2024-10251 1 Ivanti 1 Security Controls 2024-12-20 7.8 High
Under specific circumstances, insecure permissions in Ivanti Security Controls before version 2024.4.1 allows a local authenticated attacker to achieve local privilege escalation.
CVE-2024-47825 1 Cilium 1 Cilium 2024-12-19 4 Medium
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.14.0 and prior to versions 1.14.16 and 1.15.10, a policy rule denying a prefix that is broader than `/32` may be ignored if there is a policy rule referencing a more narrow prefix (`CIDRSet` or `toFQDN`) and this narrower policy rule specifies either `enableDefaultDeny: false` or `- toEntities: all`. Note that a rule specifying `toEntities: world` or `toEntities: 0.0.0.0/0` is insufficient, it must be to entity `all`.This issue has been patched in Cilium v1.14.16 and v1.15.10. As this issue only affects policies using `enableDefaultDeny: false` or that set `toEntities` to `all`, some workarounds are available. For users with policies using `enableDefaultDeny: false`, remove this configuration option and explicitly define any allow rules required. For users with egress policies that explicitly specify `toEntities: all`, use `toEntities: world`.
CVE-2024-12666 1 Classcms 1 Classcms 2024-12-19 4.7 Medium
A vulnerability has been found in ClassCMS up to 4.8 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin?do=admin:user:editPost of the component User Management Page. The manipulation leads to improper handling of insufficient privileges. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-9845 1 Ivanti 1 Automation 2024-12-19 7.8 High
Under specific circumstances, insecure permissions in Ivanti Automation before version 2024.4.0.1 allows a local authenticated attacker to achieve local privilege escalation.
CVE-2018-9431 1 Google 1 Android 2024-12-18 7.8 High
In OSUInfo of OSUInfo.java, there is a possible escalation of privilege due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21129 1 Google 1 Android 2024-12-18 7.8 High
In getFullScreenIntentDecision of NotificationInterruptStateProviderImpl.java, there is a possible activity launch while the app is in the background due to a BAL bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-274759612
CVE-2023-21121 1 Google 1 Android 2024-12-18 7.8 High
In onResume of AppManagementFragment.java, there is a possible way to prevent users from forgetting a previously connected VPN due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-205460459
CVE-2024-21946 1 Amd 2 Ryzen Master, Ryzen Master Utility For Overclocking Control 2024-12-18 7.3 High
Incorrect default permissions in the AMD RyzenTM Master Utility installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
CVE-2024-21938 1 Amd 1 Management Plugin For Sccm 2024-12-18 7.3 High
Incorrect default permissions in the AMD Management Plugin for the Microsoft® System Center Configuration Manager (SCCM) installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.
CVE-2024-21939 1 Amd 2 Cloud Manageability Service, Cloud Manageability Service Acms Software 2024-12-18 7.3 High
Incorrect default permissions in the AMD Cloud Manageability Service (ACMS) Software installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
CVE-2024-21945 1 Amd 2 Ryzen Master, Ryzen Master Monitoring Software Development Kit 2024-12-18 7.3 High
Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
CVE-2024-21957 1 Amd 1 Management Console 2024-12-18 7.3 High
Incorrect default permissions in the AMD Management Console installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
CVE-2024-21958 1 Amd 2 Provisioning Console, Provisioning Console Apc Software 2024-12-18 7.3 High
Incorrect default permissions in the AMD Provisioning Console installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.