Vulnerabilities (CVE)

Filtered by CWE-732
Total 1220 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-4347 1 Ibm 1 Infosphere Information Server 2021-07-21 7.5 HIGH 7.3 HIGH
IBM InfoSphere Information Server 11.3, 11.5, and 11.7 could be subject to attacks based on privilege escalation due to inappropriate file permissions for files used by WebSphere Application Server Network Deployment. IBM X-Force ID: 178412.
CVE-2020-15528 1 Gog 1 Galaxy 2021-07-21 9.3 HIGH 7.8 HIGH
An issue was discovered in GOG Galaxy Client 2.0.17. Local escalation of privileges is possible when a user starts or uninstalls a game because of weak file permissions and missing file integrity checks.
CVE-2020-26106 1 Cpanel 1 Cpanel 2021-07-21 5.0 MEDIUM 7.5 HIGH
cPanel before 88.0.3 has weak permissions (world readable) for the proxy subdomains log file (SEC-558).
CVE-2020-15838 1 Connectwise 1 Automate 2021-07-21 6.5 MEDIUM 8.8 HIGH
The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.
CVE-2020-1170 1 Microsoft 12 Forefront Endpoint Protection 2010, Security Essentials, System Center Endpoint Protection and 9 more 2021-07-21 7.2 HIGH 7.8 HIGH
An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1163.
CVE-2020-13912 1 Solarwinds 1 Advanced Monitoring Agent 2021-07-21 6.0 MEDIUM 7.3 HIGH
SolarWinds Advanced Monitoring Agent before 10.8.9 allows local users to gain privileges via a Trojan horse .exe file, because everyone can write to a certain .exe file.
CVE-2020-12120 1 Prestashop 1 Correos Express 2021-07-21 5.0 MEDIUM 7.5 HIGH
The Correos Express addon for PrestaShop 1.6 through 1.7 allows remote attackers to obtain sensitive information, such as a service's owner password that can be used to modify orders via SOAP. Attackers can also retrieve information about orders or buyers.
CVE-2020-12842 1 Gogogate 2 Ismartgate Pro, Ismartgate Pro Firmware 2021-07-21 7.5 HIGH 9.8 CRITICAL
ismartgate PRO 1.5.9 is vulnerable to privilege escalation by appending PHP code to /cron/checkUserExpirationDate.php.
CVE-2020-12839 1 Gogogate 2 Ismartgate Pro, Ismartgate Pro Firmware 2021-07-21 7.5 HIGH 9.8 CRITICAL
ismartgate PRO 1.5.9 is vulnerable to privilege escalation by appending PHP code to /cron/checkExpirationDate.php.
CVE-2020-12302 1 Intel 1 Driver \& Support Assistant 2021-07-21 4.6 MEDIUM 7.8 HIGH
Improper permissions in the Intel(R) Driver & Support Assistant before version 20.7.26.7 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2019-14480 1 Adremsoft 1 Netcrunch 2021-07-21 7.5 HIGH 9.8 CRITICAL
AdRem NetCrunch 10.6.0.4587 has an Improper Session Handling vulnerability in the NetCrunch web client, which can lead to an authentication bypass or escalation of privileges.
CVE-2020-13431 1 Geti2p 1 I2p 2021-07-21 7.2 HIGH 7.8 HIGH
I2P before 0.9.46 allows local users to gain privileges via a Trojan horse I2PSvc.exe file because of weak permissions on a certain %PROGRAMFILES% subdirectory.
CVE-2019-20358 2 Microsoft, Trendmicro 2 Windows, Anti-threat Toolkit 2021-07-21 5.1 MEDIUM 7.8 HIGH
Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below have a vulnerability that may allow an attacker to place malicious files in the same directory, potentially leading to arbitrary remote code execution (RCE) when executed. Another attack vector similar to CVE-2019-9491 was idenitfied and resolved in version 1.62.0.1228 of the tool.
CVE-2020-5755 1 Webroot 1 Endpoint Agents 2021-07-21 6.9 MEDIUM 7.8 HIGH
Webroot endpoint agents prior to version v9.0.28.48 did not protect the "%PROGRAMDATA%\WrData\PKG" directory against renaming. This could allow attackers to trigger a crash or wait upon Webroot service restart to rewrite and hijack dlls in this directory for privilege escalation.
CVE-2019-11154 1 Intel 14 Dual Band Wireless-ac 3165, Dual Band Wireless-ac 3168, Dual Band Wireless-ac 7265 \(rev D\) and 11 more 2021-07-21 3.6 LOW 7.1 HIGH
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.
CVE-2019-19895 1 Ixpdata 1 Easyinstall 2021-07-21 4.6 MEDIUM 7.8 HIGH
In IXP EasyInstall 6.2.13723, there is Lateral Movement (using the Agent Service) against other users on a client system. An authenticated attacker can, by modifying %SYSTEMDRIVE%\IXP\SW\[PACKAGE_CODE]\EveryLogon.bat, achieve this movement and execute code in the context of other users.
CVE-2020-3948 1 Vmware 2 Fusion, Workstation 2021-07-21 4.6 MEDIUM 7.8 HIGH
Linux Guest VMs running on VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a local privilege escalation vulnerability due to improper file permissions in Cortado Thinprint. Local attackers with non-administrative access to a Linux guest VM with virtual printing enabled may exploit this issue to elevate their privileges to root on the same guest VM.
CVE-2019-19218 1 Bmcsoftware 1 Control-m\/agent 2021-07-21 4.3 MEDIUM 7.5 HIGH
BMC Control-M/Agent 7.0.00.000 has Insecure Password Storage.
CVE-2020-11613 1 Mids\' Reborn Hero Designer Project 1 Mids\' Reborn Hero Designer 2021-07-21 4.4 MEDIUM 7.8 HIGH
Mids' Reborn Hero Designer 2.6.0.7 has an elevation of privilege vulnerability due to default and insecure permissions being set for the installation folder. By default, the Authenticated Users group has Modify permissions to the installation folder. Because of this, any user on the system can replace binaries or plant malicious DLLs to obtain elevated, or different, privileges, depending on the context of the user that runs the application.
CVE-2020-9024 1 Iteris 2 Vantage Velocity, Vantage Velocity Firmware 2021-07-21 10.0 HIGH 9.8 CRITICAL
Iteris Vantage Velocity Field Unit 2.3.1 and 2.4.2 devices have world-writable permissions for the /root/cleardata.pl (executed as root by crond) and /root/loadperl.sh (executed as root at boot time) scripts.