The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center exposes functionality that allows low-privileged users to interact with the device and exploit a stack buffer overflow via specially crafted IOCTL requests and elevate system privileges.
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
A Local Privilege Escalation vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges.
An elevation of privilege vulnerability exists in the way the Windows Graphics Component handles objects in memory.
An elevation of privilege vulnerability exists in the way the Windows Graphics Component handles objects in memory.
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
The Security Service of Cisco AnyConnect Posture (HostScan) for Windows incorrectly restricts access to internal IPC commands. This could enable low-privileged users to achieve NT AUTHORITY\SYSTEM privileges by sending crafted IPC commands. This module bypasses CVE-2021-1366 by abusing a Time-of-check Time-of-use (TOCTOU) Race Condition in the priv_file_copy command.
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
Pagination
- Previous page
- Page 8
- Next page