Search Results (9085 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2012-1563 1 Joomla 1 Joomla\! 2024-11-21 7.5 High
Joomla! before 2.5.3 allows Admin Account Creation.
CVE-2012-1104 3 Apereo, Debian, Linux 3 Phpcas, Debian Linux, Linux Kernel 2024-11-21 5.3 Medium
A Security Bypass vulnerability exists in the phpCAS 1.2.2 library from the jasig project due to the way proxying of services are managed.
CVE-2011-4954 1 Cobblerd 1 Cobbler 2024-11-21 7.8 High
cobbler has local privilege escalation via the use of insecure location for PYTHON_EGG_CACHE
CVE-2011-3349 1 Lightdm Project 1 Lightdm 2024-11-21 7.8 High
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
CVE-2011-3172 1 Suse 1 Suse Linux Enterprise Server 2024-11-21 N/A
A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12.
CVE-2011-2910 2 Debian, Linux-ax25 2 Debian Linux, Ax25-tools 2024-11-21 6.7 Medium
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
CVE-2011-2767 4 Apache, Canonical, Debian and 1 more 8 Mod Perl, Ubuntu Linux, Debian Linux and 5 more 2024-11-21 N/A
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.
CVE-2010-4664 3 Consolekit Project, Debian, Redhat 3 Consolekit, Debian Linux, Enterprise Linux 2024-11-21 8.8 High
In ConsoleKit before 0.4.2, an intended security policy restriction bypass was found. This flaw allows an authenticated system user to escalate their privileges by initiating a remote VNC session.
CVE-2006-4243 1 Linux-vserver 1 Linux-vserver 2024-11-21 9.8 Critical
linux vserver 2.6 before 2.6.17 suffers from privilege escalation in remount code.
CVE-2003-5001 1 Ibm 1 Iss Blackice Pc Protection 2024-11-20 5.3 Medium
A vulnerability was found in ISS BlackICE PC Protection and classified as critical. Affected by this issue is the component Cross Site Scripting Detection. The manipulation as part of POST/PUT/DELETE/OPTIONS Request leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2024-11073 1 Mayurik 1 Hospital Management System 2024-11-18 4.3 Medium
A vulnerability classified as problematic has been found in SourceCodester Hospital Management System 1.0. This affects an unknown part of the file /vm/patient/delete-account.php. The manipulation of the argument id leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-29119 1 Siemens 1 Spectrum Power 7 2024-11-15 7.8 High
A vulnerability has been identified in Spectrum Power 7 (All versions < V24Q3). The affected product contains several root-owned SUID binaries that could allow an authenticated local attacker to escalate privileges.
CVE-2024-49558 1 Dell 1 Smartfabric Os10 2024-11-15 7.8 High
Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) an Improper Privilege Management vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
CVE-2024-47595 1 Sap 1 Host Agent 2024-11-14 6.3 Medium
An attacker who gains local membership to sapsys group could replace local files usually protected by privileged access. On successful exploitation the attacker could cause high impact on confidentiality and integrity of the application.
CVE-2024-24409 1 Zohocorp 1 Manageengine Admanager Plus 2024-11-13 8.8 High
Zohocorp ManageEngine ADManager Plus versions 7203 and prior are vulnerable to Privilege Escalation in the Modify Computers option.
CVE-2024-51524 1 Huawei 1 Harmonyos 2024-11-07 4 Medium
Permission control vulnerability in the Wi-Fi module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2024-51527 1 Huawei 2 Emui, Harmonyos 2024-11-07 5.1 Medium
Permission control vulnerability in the Gallery app Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2024-51521 1 Huawei 1 Harmonyos 2024-11-07 5.7 Medium
Input parameter verification vulnerability in the background service module Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2024-10766 1 Codezips 1 Free Exam Hall Seating Management System 2024-11-06 6.3 Medium
A vulnerability, which was classified as critical, has been found in Codezips Free Exam Hall Seating Management System 1.0. This issue affects some unknown processing of the file /pages/save_user.php. The manipulation of the argument image leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher disclosure contains confusing vulnerability classes and file names.
CVE-2024-10765 1 Codezips 1 Online Institute Management System 2024-11-06 6.3 Medium
A vulnerability classified as critical was found in Codezips Online Institute Management System up to 1.0. This vulnerability affects unknown code of the file /profile.php. The manipulation of the argument old_image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.