Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suid vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-0056
The mem_write function in the Linux kernel prior to 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.
Linux Linux Kernel
2 EDB exploits
25 Github repositories
1 Article
6.7
CVSSv3
CVE-2022-31594
A highly privileged user can exploit SUID-root program to escalate his privileges to root on a local Unix system.
Sap Adaptive Server Enterprise 16.0
Sap Adaptive Server Enterprise Krnl64uc 7.22
Sap Adaptive Server Enterprise Krnl64uc 7.22ext
Sap Adaptive Server Enterprise Krnl64uc 7.49
Sap Adaptive Server Enterprise Krnl64uc 7.53
Sap Adaptive Server Enterprise Krnl64nuc 7.22
Sap Adaptive Server Enterprise Krnl64nuc 7.22ext
Sap Adaptive Server Enterprise Krnl64nuc 7.49
Sap Adaptive Server Enterprise Kernel 7.22
Sap Adaptive Server Enterprise Kernel 7.49
Sap Adaptive Server Enterprise Kernel 7.53
7.8
CVSSv3
CVE-2022-31322
Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows malicious users to escalate privileges via overwriting files using SUID flagged executables.
Pentasecurity Wapples V6.0.r3.4.10
Pentasecurity Wapples
NA
CVE-2007-2074
Certain programs in containers in ScramDisk 4 Linux prior to 1.0-1 execute with SUID permissions, which allows local users to gain privileges via mounted containers.
Scramdisk 4 Linux Scramdisk 4 Linux
7.8
CVSSv3
CVE-2016-10156
A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local malicious users to escalate their privileges to root. This is fixed in v229.
Systemd Project Systemd 228
1 EDB exploit
1 Article
7
CVSSv3
CVE-2017-15358
Race condition in the Charles Proxy Settings suid binary in Charles Proxy prior to 4.2.1 allows local users to gain privileges via vectors involving the --self-repair option.
Charlesproxy Charles
1 EDB exploit
7.1
CVSSv3
CVE-2016-10330
Directory traversal vulnerability in synophoto_dsm_user, a SUID program, as used in Synology Photo Station prior to 6.5.3-3226 allows local users to write to arbitrary files via unspecified vectors.
Synology Photo Station
7.8
CVSSv3
CVE-2017-16873
It is possible to exploit an unsanitized PATH in the suid binary that ships with vagrant-vmware-fusion 4.0.25 up to and including 5.0.4 in order to escalate to root privileges.
Hashicorp Vagrant Vmware Fusion
7.8
CVSSv3
CVE-2017-12579
An insecure suid wrapper binary in the HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 4.0.24 and previous versions allows a non-root user to obtain a root shell.
Hashicorp Vagrant Vmware Fusion
1 EDB exploit
7.8
CVSSv3
CVE-2021-34591
In Bender/ebee Charge Controllers in multiple versions are prone to Local privilege Escalation. An authenticated attacker could get root access via the suid applications socat, ip udhcpc and ifplugd.
Bender Cc612 Firmware
Bender Icc15xx Firmware
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »