Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
privilege escalation vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-2533
/sbin/ifwatchd in BlackBerry QNX Neutrino RTOS 6.4.x and 6.5.x allows local users to gain privileges by providing an arbitrary program name as a command-line argument.
Blackberry Qnx Neutrino Rtos 6.4.1
Blackberry Qnx Neutrino Rtos 6.5.0
2 EDB exploits
6.5
CVSSv3
CVE-2017-1000373
The OpenBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows malicious users to consume arbitrary amounts of stack memory and manipulate st...
Openbsd Openbsd
1 EDB exploit
NA
CVE-2005-3098
poppassd in Qualcomm qpopper 4.0.8 allows local users to modify arbitrary files and gain privileges via the -t (trace file) command line argument.
Qualcomm Qpopper 4.0.8
2 EDB exploits
NA
CVE-2014-9643
K7Sentry.sys in K7 Computing Ultimate Security, Anti-Virus Plus, and Total Security prior to 14.2.0.253 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, or 0x9500...
K7computing K7sentry.sys
K7computing Anti-virus Plus
K7computing Total Security
K7computing Ultimate Security
1 EDB exploit
7.8
CVSSv3
CVE-2016-6253
mail.local in NetBSD versions 6.0 up to and including 6.0.6, 6.1 up to and including 6.1.5, and 7.0 allows local users to change ownership of or append data to arbitrary files on the target system via a symlink attack on the user mailbox.
Netbsd Netbsd 6.1.3
Netbsd Netbsd 6.1.1
Netbsd Netbsd 6.1.2
Netbsd Netbsd 6.0.2
Netbsd Netbsd 6.0.3
Netbsd Netbsd 6.0.4
Netbsd Netbsd 6.0.5
Netbsd Netbsd 6.0
Netbsd Netbsd 6.0.6
Netbsd Netbsd 6.1.4
Netbsd Netbsd 7.0
Netbsd Netbsd 6.0.1
Netbsd Netbsd 6.1
Netbsd Netbsd 6.1.5
2 EDB exploits
7.8
CVSSv3
CVE-2019-18862
maidag in GNU Mailutils prior to 3.8 is installed setuid and allows local privilege escalation in the url mode.
Gnu Mailutils
1 EDB exploit
7.8
CVSSv3
CVE-2018-0438
A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local malicious user to elevate privileges to Administrator. To exploit the vulnerability, the attacker must authenticate with valid local user credentials. This vulnerability is d...
Cisco Umbrella Enterprise Roaming Client
1 EDB exploit
7.8
CVSSv3
CVE-2023-36594
Windows Graphics Component Elevation of Privilege Vulnerability
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2019 -
Microsoft Windows Server 2022 -
Microsoft Windows 11 22h2
Microsoft Windows 11 21h2
Microsoft Windows 10 1507
Microsoft Windows 10 1809
Microsoft Windows 10 21h1
Microsoft Windows 10 22h2
NA
CVE-2014-4971
Microsoft Windows XP SP3 does not validate addresses in certain IRP handler routines, which allows local users to write data to arbitrary memory locations, and consequently gain privileges, via a crafted address in an IOCTL call, related to (1) the MQAC.sys driver in the MQ Acces...
Microsoft Windows Xp
4 EDB exploits
NA
CVE-2024-1155
Incorrect permissions in the installation directories for shared SystemLink Elixir based services may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »