Total
949 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-0009 | 2 Debian, Google | 2 Debian Linux, Android | 2022-10-14 | 2.1 LOW | 5.5 MEDIUM |
In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932 | |||||
CVE-2022-20436 | 1 Google | 1 Android | 2022-10-13 | N/A | 7.8 HIGH |
There is an unauthorized service in the system service. Since the component does not have permission check, resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242248369 | |||||
CVE-2022-20435 | 1 Google | 1 Android | 2022-10-12 | N/A | 7.8 HIGH |
There is a Unauthorized service in the system service, may cause the system reboot. Since the component does not have permission check and permission protection, resulting in EoP problem.Product: AndroidVersions: Android SoCAndroid ID: A-242248367 | |||||
CVE-2022-23802 | 1 Ijoomla | 1 Guru | 2022-10-12 | 5.0 MEDIUM | 7.5 HIGH |
Joomla Guru extension 5.2.5 is affected by: Insecure Permissions. The impact is: obtain sensitive information (remote). The component is: Access to private information and components, possibility to view other users' information. Information disclosure Access to private information and components, possibility to view other users' information. | |||||
CVE-2022-41748 | 2 Microsoft, Trendmicro | 2 Windows, Apex One | 2022-10-11 | N/A | 6.7 MEDIUM |
A registry permissions vulnerability in the Trend Micro Apex One Data Loss Prevention (DLP) module could allow a local attacker with administrative credentials to bypass certain elements of the product's anti-tampering mechanisms on affected installations. Please note: an attacker must first obtain administrative credentials on the target system in order to exploit this vulnerability. | |||||
CVE-2022-26235 | 1 Beckmancoulter | 1 Remisol Advance | 2022-10-11 | N/A | 7.8 HIGH |
A vulnerability was discovered in the Remisol Advance v2.0.12.1 and below for the Normand Message Server. On installation, the permissions set by Remisol Advance allow non-privileged users to overwrite and/or manipulate executables and libraries that run as the elevated SYSTEM user on Windows. | |||||
CVE-2022-41414 | 1 Liferay | 1 Liferay Portal | 2022-10-11 | N/A | 5.3 MEDIUM |
An insecure default in the component auth.login.prompt.enabled of Liferay Portal v7.0.0 through v7.4.2 allows attackers to enumerate usernames, site names, and pages. | |||||
CVE-2020-13539 | 1 Win911 | 1 Win-911 | 2022-10-07 | 4.6 MEDIUM | 7.8 HIGH |
An exploitable local privilege elevation vulnerability exists in the file system permissions of the Win-911 Enterprise V4.20.13 install directory via “WIN-911 Mobile Runtime” service. Depending on the vector chosen, an attacker can overwrite various executables which could lead to escalation of the privileges when executed. | |||||
CVE-2020-13541 | 1 Win911 | 1 Mobile-911 Server | 2022-10-07 | 7.2 HIGH | 8.8 HIGH |
An exploitable local privilege elevation vulnerability exists in the file system permissions of the Mobile-911 Server V2.5 install directory. Depending on the vector chosen, an attacker can overwrite the service executable and execute arbitrary code with System privileges or replace other files within the installation folder that could lead to local privilege escalation. | |||||
CVE-2020-13540 | 1 Win911 | 1 Win-911 | 2022-10-07 | 4.6 MEDIUM | 7.8 HIGH |
An exploitable local privilege elevation vulnerability exists in the file system permissions of the Win-911 Enterprise V4.20.13 install directory via WIN-911 Account Change Utility. Depending on the vector chosen, an attacker can overwrite various executables which could lead to escalation of the privileges when executed. | |||||
CVE-2020-13549 | 1 Sytech | 1 Xlreporter | 2022-10-06 | 7.2 HIGH | 7.8 HIGH |
An exploitable local privilege elevation vulnerability exists in the file system permissions of Sytech XL Reporter v14.0.1 install directory. Depending on the vector chosen, an attacker can overwrite service executables and execute arbitrary code with privileges of user set to run the service or replace other files within the installation folder, which would allow for local privilege escalation. | |||||
CVE-2021-40415 | 1 Reolink | 2 Rlc-410w, Rlc-410w Firmware | 2022-10-06 | 6.8 MEDIUM | 6.5 MEDIUM |
An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. In cgi_check_ability the Format API does not have a specific case, the user permission will default to 7. This will give non-administrative users the possibility to format the SD card and reboot the device. | |||||
CVE-2021-21912 | 2 Advantech, Microsoft | 2 R-seenet, Windows | 2022-10-05 | 7.2 HIGH | 7.8 HIGH |
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. | |||||
CVE-2021-38268 | 1 Liferay | 2 Digital Experience Platform, Liferay Portal | 2022-10-05 | 4.0 MEDIUM | 6.5 MEDIUM |
The Dynamic Data Mapping module in Liferay Portal 7.0.0 through 7.3.6, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 2 incorrectly sets default permissions for site members, which allows remote authenticated users with the site member role to add and duplicate forms, via the UI or the API. | |||||
CVE-2020-13554 | 1 Advantech | 1 Webaccess\/scada | 2022-09-30 | 7.2 HIGH | 7.8 HIGH |
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. | |||||
CVE-2022-3263 | 1 Measuresoft | 1 Scadapro Server | 2022-09-27 | N/A | 7.8 HIGH |
The security descriptor of Measuresoft ScadaPro Server version 6.7 has inconsistent permissions, which could allow a local user with limited privileges to modify the service binary path and start malicious commands with SYSTEM privileges. | |||||
CVE-2022-38764 | 2 Microsoft, Trendmicro | 2 Windows, Housecall | 2022-09-21 | N/A | 7.8 HIGH |
A vulnerability on Trend Micro HouseCall version 1.62.1.1133 and below could allow a local attacker to escalate privlieges due to an overly permissive folder om the product installer. | |||||
CVE-2022-2528 | 1 Octopus | 1 Octopus Server | 2022-09-15 | N/A | 6.5 MEDIUM |
In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages. | |||||
CVE-2022-38466 | 1 Siemens | 1 Coreshield One-way Gateway | 2022-09-15 | N/A | 7.8 HIGH |
A vulnerability has been identified in CoreShield One-Way Gateway (OWG) Software (All versions < V2.2). The default installation sets insecure file permissions that could allow a local attacker to escalate privileges to local administrator. | |||||
CVE-2022-40109 | 1 Totolink | 2 A3002r, A3002r Firmware | 2022-09-09 | N/A | 9.8 CRITICAL |
TOTOLINK A3002R TOTOLINK-A3002R-He-V1.1.1-B20200824.0128 is vulnerable to Insecure Permissions via binary /bin/boa. |