Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-269
Total 1509 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-5253 1 Nethack 1 Nethack 2020-03-20 7.5 HIGH 9.8 CRITICAL
NetHack before version 3.6.0 allowed malicious use of escaping of characters in the configuration file (usually .nethackrc) which could be exploited. This bug is patched in NetHack 3.6.0.
CVE-2020-6584 1 Nagios 1 Nagios 2020-03-19 4.0 MEDIUM 6.5 MEDIUM
Nagios Log Server 2.1.3 has Incorrect Access Control.
CVE-2019-18845 1 Patriotmemory 2 Viper Rgb, Viper Rgb Firmware 2020-03-18 3.6 LOW 7.1 HIGH
The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.
CVE-2020-0785 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2020-03-18 3.6 LOW 7.1 HIGH
An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile Service Elevation of Privilege Vulnerability'.
CVE-2020-8113 1 Gitlab 1 Gitlab 2020-03-18 7.5 HIGH 9.8 CRITICAL
GitLab 10.7 and later through 12.7.2 has Incorrect Access Control.
CVE-2020-10588 1 V2rayl Project 1 V2rayl 2020-03-17 7.2 HIGH 7.8 HIGH
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/add.sh and /etc/v2rayL/remove.sh are owned by a low-privileged user but execute as root via Sudo.
CVE-2020-10589 1 V2rayl Project 1 V2rayl 2020-03-17 7.2 HIGH 7.8 HIGH
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
CVE-2020-7254 1 Mcafee 1 Advanced Threat Defense 2020-03-17 4.6 MEDIUM 7.8 HIGH
Privilege Escalation vulnerability in the command line interface in McAfee Advanced Threat Defense (ATD) 4.x prior to 4.8.2 allows local users to execute arbitrary code via improper access controls on the sudo command.
CVE-2020-0799 1 Microsoft 7 Windows 10, Windows 7, Windows 8.1 and 4 more 2020-03-17 7.2 HIGH 7.8 HIGH
An elevation of privilege vulnerability exists in Microsoft Windows when the Windows kernel fails to properly handle parsing of certain symbolic links, aka 'Windows Kernel Elevation of Privilege Vulnerability'.
CVE-2019-12183 1 Safescan 14 Ta-8010, Ta-8010 Firmware, Ta-8015 and 11 more 2020-03-13 5.0 MEDIUM 7.5 HIGH
Incorrect Access Control in Safescan Timemoto TM-616 and TA-8000 series allows remote attackers to read any file via the administrative API.
CVE-2020-6971 1 Emerson 1 Valvelink 2020-03-09 4.6 MEDIUM 7.8 HIGH
In Emerson ValveLink v12.0.264 to v13.4.118, a vulnerability in the ValveLink software may allow a local, unprivileged, trusted insider to escalate privileges due to insecure configuration parameters.
CVE-2019-6195 1 Lenovo 33 Thinkagile Hx 1000, Thinkagile Hx 2000, Thinkagile Hx 3000 and 30 more 2020-03-04 2.1 LOW 4.8 MEDIUM
An authorization bypass exists in Lenovo XClarity Controller (XCC) versions prior to 3.08 CDI340V, 3.01 TEI392O, 1.71 PSI328N where a valid authenticated user with lesser privileges may be granted read-only access to higher-privileged information if 1) “LDAP Authentication Only with Local Authorization” mode is configured and used by XCC, and 2) a lesser privileged user logs into XCC within 1 minute of a higher privileged user logging out. The authorization bypass does not exist when “Local Authentication and Authorization” or “LDAP Authentication and Authorization” modes are configured and used by XCC.
CVE-2020-6968 1 Honeywell 2 Inncom Inncontrol, Inncom Inncontrol Firmware 2020-02-28 4.6 MEDIUM 7.8 HIGH
Honeywell INNCOM INNControl 3 allows workstation users to escalate application user privileges through the modification of local configuration files.
CVE-2020-3112 1 Cisco 1 Data Center Network Manager 2020-02-24 6.5 MEDIUM 8.8 HIGH
A vulnerability in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to elevate privileges on the application. The vulnerability is due to insufficient access control validation. An attacker could exploit this vulnerability by authenticating with a low-privilege account and sending a crafted request to the API. A successful exploit could allow the attacker to interact with the API with administrative privileges.
CVE-2013-3323 1 Ibm 13 Change And Configuration Management Database, Maximo Asset Management, Maximo Asset Management Essentials and 10 more 2020-02-21 6.8 MEDIUM 9.8 CRITICAL
A Privilege Escalation Vulnerability exists in IBM Maximo Asset Management 7.5, 7.1, and 6.2, when WebSeal with Basic Authentication is used, due to a failure to invalidate the authentication session, which could let a malicious user obtain unauthorized access.
CVE-2013-6295 1 Prestashop 1 Prestashop 2020-02-21 7.5 HIGH 9.8 CRITICAL
PrestaShop 1.5.5 vulnerable to privilege escalation via a Salesman account via upload module
CVE-2014-4170 1 Freereprintables 1 Articlefr 2020-02-19 7.5 HIGH 9.8 CRITICAL
A Privilege Escalation Vulnerability exists in Free Reprintables ArticleFR 11.06.2014 due to insufficient access restrictions in the data.php script, which could let a remote malicious user obtain access or modify or delete database information.
CVE-2018-9334 1 Paloaltonetworks 1 Pan-os 2020-02-17 2.1 LOW 5.5 MEDIUM
The PAN-OS management web interface page in PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.8 and earlier, and PAN-OS 8.1.0 may allow an attacker to access the GlobalProtect password hashes of local users via manipulation of the HTML markup.
CVE-2018-10143 1 Paloaltonetworks 1 Expedition 2020-02-17 10.0 HIGH 9.8 CRITICAL
The Palo Alto Networks Expedition Migration tool 1.0.107 and earlier may allow an unauthenticated attacker with remote access to run system level commands on the device hosting this service/application.
CVE-2020-0686 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2020-02-13 7.2 HIGH 7.8 HIGH
An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0683.